google / hashrLinks
☆123Updated 5 months ago
Alternatives and similar repositories for hashr
Users that are interested in hashr are comparing it to the libraries listed below
Sorting:
- enpoint detection / live analysis & sandbox host / signatures quality test☆44Updated 4 years ago
- gyp: A pure Go YARA parser☆106Updated last year
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆132Updated 3 years ago
- The core backend server handling API requests and task management☆48Updated this week
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆65Updated 3 years ago
- A Go implementation and parser for Sigma rules.☆92Updated 4 months ago
- Lightweight Python-Based Malware Analysis Pipeline☆35Updated 3 weeks ago
- Helm charts for running open source digital forensic tools in Kubernetes☆120Updated this week
- Cisco Orbital - Osquery queries by Talos☆136Updated last year
- Harvest Linux forensic data for operational triage of an event.☆51Updated last year
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆30Updated 7 months ago
- Hunt for SQLite files used by various applications☆26Updated last week
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆126Updated 2 years ago
- JPCERT/CC public YARA rules repository☆110Updated 10 months ago
- ☆50Updated 3 weeks ago
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆59Updated 4 months ago
- Golang-based SDK to CrowdStrike's APIs☆74Updated last week
- Imphash-like calculation on Golang binaries☆49Updated 3 years ago
- ForgeArmory provides TTPs that can be used with the TTPForge (https://github.com/facebookincubator/ttpforge).☆117Updated last year
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (ext4, XFS) journals (not systemd-journald logs), gene…☆89Updated last week
- pocket guide for core detection engineering concepts☆30Updated 2 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆78Updated 2 years ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated 2 years ago
- IOCs published by Black Lotus Labs☆122Updated 3 weeks ago
- The Dissect module tying all other Dissect modules together. It provides a programming API and command line tools which allow easy access…☆74Updated this week
- Golang Parser for Microsoft Event Logs☆105Updated 3 months ago
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆104Updated last year
- ☆16Updated 6 months ago
- Repository that contains a set of purposefully erroneous Yara rules.☆59Updated 2 months ago