ganboing / malwarecookbookLinks
Automatically exported from code.google.com/p/malwarecookbook
☆41Updated 10 years ago
Alternatives and similar repositories for malwarecookbook
Users that are interested in malwarecookbook are comparing it to the libraries listed below
Sorting:
- Dump of organized knowledge on DFIR☆135Updated 4 years ago
- Python IOC Editor☆64Updated 10 years ago
- SEC599 supporting GitHub repository☆16Updated 6 years ago
- Slides and Other Resources from my latest Talks and Presentations☆24Updated 3 months ago
- EVTXtract recovers and reconstructs fragments of EVTX log files from raw binary data, including unallocated space and memory images.☆203Updated 9 months ago
- Term concordances for each course in the SANS DFIR curriculum. Used for automated index generation.☆68Updated 5 years ago
- PE Import Hash Generator☆79Updated 8 years ago
- Tools from WFA 4/e, timeline tools, etc.☆144Updated last year
- Parse Windows Prefetch files: Supports XP - Windows 10 Prefetch files☆120Updated last year
- Extract common Windows artifacts from source images and VSCs☆63Updated 4 years ago
- Understanding ATT&CK Matrix for Enterprise☆81Updated 7 years ago
- Repository containing IOCs, CSV and MISP JSON from our blogs☆83Updated 4 years ago
- Collecting & Hunting for IOCs with gusto and style☆241Updated 4 years ago
- A Splunk app with saved reports derived from Sigma rules☆73Updated 7 years ago
- MAEC Schemas and Schema Development☆89Updated 5 years ago
- A lightweight tool to load Windows Event Log evtx files into Elasticsearch.☆119Updated 5 years ago
- ☆77Updated 6 years ago
- Volatility plugins created by the author☆44Updated 10 years ago
- Expert Investigation Guides☆51Updated 4 years ago
- A curated list of awesome YARA rules, tools, and people.☆33Updated 2 years ago
- Command line interface to Carbon Black Response☆38Updated 5 years ago
- Invoke-LiveResponse☆149Updated 3 years ago
- ☆116Updated last year
- InvestigationPlaybookSpec☆72Updated 8 years ago
- ☆39Updated 6 years ago
- Splunk Boss of the SOC v1 data set.☆113Updated 7 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆62Updated 2 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆75Updated last year
- Tools for the Computer Incident Response Team☆149Updated 8 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 8 years ago