google / hashrLinks
☆127Updated 7 months ago
Alternatives and similar repositories for hashr
Users that are interested in hashr are comparing it to the libraries listed below
Sorting:
- gyp: A pure Go YARA parser☆106Updated last year
- enpoint detection / live analysis & sandbox host / signatures quality test☆44Updated 4 years ago
- Golang-based SDK to CrowdStrike's APIs☆78Updated last week
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆128Updated 2 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆133Updated 3 years ago
- Cisco Orbital - Osquery queries by Talos☆136Updated last year
- Helm charts for running open source digital forensic tools in Kubernetes☆176Updated this week
- Lightweight Python-Based Malware Analysis Pipeline☆37Updated 3 weeks ago
- Hunt for SQLite files used by various applications☆27Updated last month
- A Go implementation and parser for Sigma rules.☆93Updated 7 months ago
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago
- ☆52Updated 2 weeks ago
- Harvest Linux forensic data for operational triage of an event.☆52Updated last month
- acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.☆113Updated 2 weeks ago
- JPCERT/CC public YARA rules repository☆110Updated last month
- The core backend server handling API requests and task management☆55Updated 3 weeks ago
- Imphash-like calculation on Golang binaries☆49Updated 3 years ago
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆81Updated 6 months ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆29Updated 3 months ago
- DFIQ is a collection of investigative questions and the approaches for answering them☆298Updated 11 months ago
- pocket guide for core detection engineering concepts☆31Updated 2 years ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆30Updated 10 months ago
- The Dissect module tying all other Dissect modules together. It provides a programming API and command line tools which allow easy access…☆77Updated last week
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- Entropy scanner for Linux to detect packed or encrypted binaries related to malware. Finds malicious files and Linux processes and gives …☆167Updated last year
- IOCs published by Black Lotus Labs☆124Updated 2 months ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆119Updated 2 years ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆114Updated 7 months ago
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (ext4, XFS) journals (not systemd-journald logs), gene…☆98Updated last week