google / hashrLinks
☆126Updated 7 months ago
Alternatives and similar repositories for hashr
Users that are interested in hashr are comparing it to the libraries listed below
Sorting:
- enpoint detection / live analysis & sandbox host / signatures quality test☆44Updated 4 years ago
- gyp: A pure Go YARA parser☆106Updated last year
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆126Updated 2 years ago
- A Go implementation and parser for Sigma rules.☆92Updated 6 months ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆133Updated 3 years ago
- Cisco Orbital - Osquery queries by Talos☆136Updated last year
- Helm charts for running open source digital forensic tools in Kubernetes☆173Updated this week
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago
- Lightweight Python-Based Malware Analysis Pipeline☆36Updated this week
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆119Updated 2 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- JPCERT/CC public YARA rules repository☆110Updated 3 weeks ago
- Golang-based SDK to CrowdStrike's APIs☆77Updated this week
- The core backend server handling API requests and task management☆53Updated last week
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (ext4, XFS) journals (not systemd-journald logs), gene…☆96Updated 2 weeks ago
- Golang Parser for Microsoft Event Logs☆105Updated last month
- Imphash-like calculation on Golang binaries☆49Updated 3 years ago
- Hunt for SQLite files used by various applications☆27Updated last month
- Harvest Linux forensic data for operational triage of an event.☆51Updated last week
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆30Updated 9 months ago
- BlackBerry Threat Research & Intelligence☆99Updated 2 years ago
- IOCs published by Black Lotus Labs☆124Updated last month
- YaraScanner is a file pattern-matching tool based on YARA rules.☆59Updated 2 years ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆29Updated 2 months ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated 2 years ago
- ☆17Updated 2 months ago
- DFIQ is a collection of investigative questions and the approaches for answering them☆298Updated 10 months ago
- The Dissect module tying all other Dissect modules together. It provides a programming API and command line tools which allow easy access…☆77Updated last week
- Carve file metadata from NTFS index ($I30) attributes☆72Updated last year