google / hashrLinks
☆121Updated 4 months ago
Alternatives and similar repositories for hashr
Users that are interested in hashr are comparing it to the libraries listed below
Sorting:
- enpoint detection / live analysis & sandbox host / signatures quality test☆44Updated 4 years ago
- gyp: A pure Go YARA parser☆106Updated last year
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆132Updated 3 years ago
- The core backend server handling API requests and task management☆46Updated last week
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆29Updated 6 months ago
- Cisco Orbital - Osquery queries by Talos☆134Updated last year
- Golang-based SDK to CrowdStrike's APIs☆72Updated this week
- ☆47Updated 6 months ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆126Updated last year
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- Helm charts for running open source digital forensic tools in Kubernetes☆117Updated last week
- Hunt for SQLite files used by various applications☆26Updated last week
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆65Updated 3 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆76Updated 2 years ago
- Lightweight Python-Based Malware Analysis Pipeline☆35Updated 2 months ago
- Imphash-like calculation on Golang binaries☆49Updated 3 years ago
- ForgeArmory provides TTPs that can be used with the TTPForge (https://github.com/facebookincubator/ttpforge).☆117Updated 11 months ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆25Updated 2 years ago
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆58Updated 3 months ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated last year
- JPCERT/CC public YARA rules repository☆110Updated 9 months ago
- Repository that contains a set of purposefully erroneous Yara rules.☆58Updated last month
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆106Updated 4 months ago
- Harvest Linux forensic data for operational triage of an event.☆51Updated last year
- pocket guide for core detection engineering concepts☆30Updated 2 years ago
- A Go implementation and parser for Sigma rules.☆92Updated 3 months ago
- IOCs from Google Threat Intelligence☆33Updated 3 months ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆84Updated 3 months ago
- The Dissect module tying all other Dissect modules together. It provides a programming API and command line tools which allow easy access…☆72Updated this week
- C2 Active Scanner☆59Updated last year