Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)
☆30Jun 24, 2014Updated 11 years ago
Alternatives and similar repositories for FileLookup
Users that are interested in FileLookup are comparing it to the libraries listed below
Sorting:
- Useful scripts, rules etc. for use with YARA☆27Feb 12, 2021Updated 5 years ago
- Searches various online resources to try and get as much info about an IP/domain as possible.☆100Jan 15, 2014Updated 12 years ago
- Static and automated/dynamic malware analysis☆47Sep 28, 2015Updated 10 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Jul 16, 2020Updated 5 years ago
- The Network File Extractor☆11Feb 27, 2014Updated 12 years ago
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Jul 6, 2014Updated 11 years ago
- _Working_ examples from Grayhat Python☆14Apr 28, 2015Updated 10 years ago
- A virtual PDF analysis framework☆17Jan 31, 2014Updated 12 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 11 years ago
- A Python library for being a CND Batman....☆35Oct 29, 2015Updated 10 years ago
- Tool to help guess a files 256 byte XOR key by using frequency analysis☆88Jun 11, 2018Updated 7 years ago
- dnssinkholelist is a python package focused on combining open source lists of malicious domains, dynamic dns domains, and advertisement d…☆18Apr 13, 2016Updated 9 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Oct 14, 2020Updated 5 years ago
- ☆17Nov 12, 2017Updated 8 years ago
- A script to reverse-engineer anti-virus signatures☆32Mar 20, 2013Updated 12 years ago
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆34Nov 17, 2018Updated 7 years ago
- Mattermost - Shodan Slash command☆31Jan 25, 2017Updated 9 years ago
- ☆26Nov 9, 2021Updated 4 years ago
- Edited version of Lee Christensen's Get-NetworkConnection which includes timestamp for each network connection☆36Mar 14, 2018Updated 7 years ago
- Malware analysis using Docker project☆25Mar 3, 2016Updated 9 years ago
- Bro Intel Feed Linter☆26Aug 30, 2019Updated 6 years ago
- (Unofficial) Python API for https://malwr.com/☆62Oct 13, 2016Updated 9 years ago
- Python Forensic and Log Analysis GUI☆27Dec 22, 2014Updated 11 years ago
- Certificate Expiration Monitor script☆27Oct 10, 2018Updated 7 years ago
- Templates for Kibana/Logstash to use with Suricata IDPS☆81Mar 12, 2016Updated 9 years ago
- ☆10Apr 20, 2022Updated 3 years ago
- Some dfir stuff☆31Jan 12, 2022Updated 4 years ago
- ANWI - All New Wireless IDS☆28Nov 28, 2025Updated 2 months ago
- File integrity monitor with malware detection using machine learning☆14May 23, 2024Updated last year
- DNSDB query scripts☆75Jan 23, 2020Updated 6 years ago
- Web application that lets you test if your domain is vulnerable to email spoofing☆41Mar 5, 2019Updated 6 years ago
- Bluewall is a firewall framework designed for offensive and defensive cyber professionals.☆106Apr 7, 2019Updated 6 years ago
- Memory forensics of virtualization environments☆48Oct 4, 2014Updated 11 years ago
- SANS Hunting on the Cheap☆36Apr 12, 2016Updated 9 years ago
- Tool to help analyze PDF files☆192May 22, 2014Updated 11 years ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- Python OSINT Tool to retrieve information from Skype☆76Oct 12, 2015Updated 10 years ago
- A mass subdomain (Subbrute) + poodle vulnerability scanner☆75Oct 31, 2018Updated 7 years ago
- Reconstruct process trees from event logs☆147Aug 12, 2020Updated 5 years ago