honeynet / DICOMHawkLinks
A DICOM honeypot for detecting and logging unauthorized access attempts
☆47Updated this week
Alternatives and similar repositories for DICOMHawk
Users that are interested in DICOMHawk are comparing it to the libraries listed below
Sorting:
- Repository of tools and resources for analyzing Docker containers☆71Updated 2 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- A YARA & Malware Analysis Toolkit written in Rust.☆89Updated 3 months ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 3 years ago
- Tor onion address lookup☆59Updated this week
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated last year
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆13Updated 2 years ago
- Rules shared by the community from 100 Days of YARA 2025☆39Updated last week
- An Adaptive Misuse Detection System☆46Updated last year
- Graphical map of known Advanced Persistent Threats☆61Updated 9 months ago
- Thor Artifacts for Velociraptor☆18Updated last month
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆69Updated this week
- Python based CLI for MalwareBazaar☆39Updated 5 months ago
- information about ransomware groups (Ransomware Analysis Notes)☆40Updated 2 years ago
- C2 Active Scanner☆59Updated last year
- ☆67Updated 2 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆27Updated 2 years ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Updated 6 months ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Updated 2 years ago
- Detection Engineering with YARA☆86Updated 2 years ago
- A little tool to filter the stranger strings from a binary so you can analyze the good ones☆52Updated 3 months ago
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Updated 2 years ago
- Placeholder for my detection repo and misc detection engineering content☆42Updated 2 years ago
- A specification and style guide for YARA rules☆64Updated last year
- Can you pay the ransom in your country?☆14Updated 2 years ago
- IOCs and notes related to malware☆26Updated 6 months ago
- ☆21Updated 2 months ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆34Updated 2 months ago
- Hive v5 file decryption algorithm☆34Updated 3 years ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆53Updated last year