Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)
☆30Jun 24, 2014Updated 11 years ago
Alternatives and similar repositories for FileLookup
Users that are interested in FileLookup are comparing it to the libraries listed below
Sorting:
- Useful scripts, rules etc. for use with YARA☆27Feb 12, 2021Updated 5 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Jul 16, 2020Updated 5 years ago
- Some dfir stuff☆31Jan 12, 2022Updated 4 years ago
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆34Nov 17, 2018Updated 7 years ago
- Cuckoo sandbox ansible role☆16Apr 30, 2023Updated 2 years ago
- Tool to help guess a files 256 byte XOR key by using frequency analysis☆88Jun 11, 2018Updated 7 years ago
- dnssinkholelist is a python package focused on combining open source lists of malicious domains, dynamic dns domains, and advertisement d…☆18Apr 13, 2016Updated 9 years ago
- Python Forensic and Log Analysis GUI☆27Dec 22, 2014Updated 11 years ago
- Placeholder for IRIS-H Digital Forensics Tool☆15May 30, 2018Updated 7 years ago
- The Network File Extractor☆11Feb 27, 2014Updated 12 years ago
- A collection of pcaps☆16Jul 5, 2015Updated 10 years ago
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Jul 6, 2014Updated 11 years ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Oct 14, 2020Updated 5 years ago
- Reconstruct process trees from event logs☆147Aug 12, 2020Updated 5 years ago
- Threat Intel and Incident Reponse☆10Aug 29, 2018Updated 7 years ago
- A virtual PDF analysis framework☆17Jan 31, 2014Updated 12 years ago
- Malware analysis using Docker project☆25Mar 3, 2016Updated 10 years ago
- Parser for Windows PowerShell script block logs☆100Aug 4, 2024Updated last year
- A Python library for being a CND Batman....☆35Oct 29, 2015Updated 10 years ago
- This repo contains a list of aws security related talks.☆12Dec 5, 2017Updated 8 years ago
- ☆17Nov 12, 2017Updated 8 years ago
- Zeek network security monitor plugin that enables parsing of the Tabular Data Stream (TDS) protocol☆25May 30, 2024Updated last year
- A mass subdomain (Subbrute) + poodle vulnerability scanner☆75Oct 31, 2018Updated 7 years ago
- Tool to help analyze PDF files☆192May 22, 2014Updated 11 years ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 5 years ago
- _Working_ examples from Grayhat Python☆14Apr 28, 2015Updated 10 years ago
- THIS REPOSITORY IS STALE. Collection of resources for penetration testing, ethical hacking, cybersecurity, organized by user context.☆10Jan 20, 2017Updated 9 years ago
- A C++ library and tools providing easy access to the retdec.com decompilation service through their REST API.☆11Jun 17, 2018Updated 7 years ago
- Plugins for the Viper Framework☆14Sep 21, 2019Updated 6 years ago
- DNSDB query scripts☆75Jan 23, 2020Updated 6 years ago
- Search a domain on VirusTotal to identify if any known malware samples have ever attempted to communicate with it☆10Jan 25, 2016Updated 10 years ago
- Web application that lets you test if your domain is vulnerable to email spoofing☆41Mar 5, 2019Updated 7 years ago
- Malware Analysis and Storage System - Server repository☆12Jul 15, 2022Updated 3 years ago
- Bro Intel Feed Linter☆26Aug 30, 2019Updated 6 years ago
- A script to reverse-engineer anti-virus signatures☆32Mar 20, 2013Updated 13 years ago
- ☆82Jul 5, 2016Updated 9 years ago
- Memory forensics of virtualization environments☆48Oct 4, 2014Updated 11 years ago
- Templates for Kibana/Logstash to use with Suricata IDPS☆81Mar 12, 2016Updated 10 years ago