fr0gger / IATelligenceLinks
IATelligence is a Python script that will extract the IAT of a PE file and request GPT to get more information about the API and the ATT&CK matrix related
☆372Updated 3 years ago
Alternatives and similar repositories for IATelligence
Users that are interested in IATelligence are comparing it to the libraries listed below
Sorting:
- ☆227Updated 3 years ago
- Jupyter Notebooks for the Blue Team☆145Updated 10 months ago
- ☆512Updated last year
- Different learning materials☆228Updated 4 months ago
- A python script developed to process Windows memory images based on triage type.☆263Updated 2 years ago
- MAL-CL (Malicious Command-Line)☆322Updated 3 years ago
- ☆194Updated last year
- This repository contains indicators of compromise (IOCs) of our various investigations.☆310Updated 2 months ago
- Signatures and IoCs from public Volexity blog posts.☆362Updated last month
- ☆152Updated 3 months ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆207Updated 3 years ago
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆214Updated this week
- A ProcessMonitor visualization application written in rust.☆184Updated 2 years ago
- Automated YARA Rule Standardization and Quality Assurance Tool☆275Updated this week
- Rules generated from our investigations.☆203Updated 7 months ago
- Ransomware simulator written in Golang☆470Updated 3 years ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆342Updated last month
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆259Updated 3 years ago
- Some Threat Hunting queries useful for blue teamers☆131Updated 3 years ago
- ☆215Updated 7 months ago
- ☆213Updated 2 months ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆629Updated 5 months ago
- ☆172Updated 2 years ago
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆97Updated 2 years ago
- MISP Playbooks☆222Updated 3 months ago
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆127Updated 2 years ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆252Updated 3 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Updated last year
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆169Updated 2 years ago
- Open Threat Hunting Framework☆123Updated 2 years ago