honeynet / DICOMHawkLinks
A DICOM honeypot for detecting and logging unauthorized access attempts
☆48Updated 3 weeks ago
Alternatives and similar repositories for DICOMHawk
Users that are interested in DICOMHawk are comparing it to the libraries listed below
Sorting:
- Thor Artifacts for Velociraptor☆19Updated 2 months ago
- The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically foc…☆57Updated last year
- Repository of tools and resources for analyzing Docker containers☆72Updated 2 years ago
- Collection of Tools & Techniques for analyzing URLs☆33Updated 2 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- Graphical map of known Advanced Persistent Threats☆62Updated last week
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 3 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆55Updated last year
- ☆20Updated last week
- Python based CLI for MalwareBazaar☆39Updated 6 months ago
- ELFEN: Automated Linux Malware Analysis Sandbox☆136Updated 5 months ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆34Updated 3 months ago
- C2 Active Scanner☆59Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Updated 2 years ago
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆11Updated 5 months ago
- Penguin OS Forensic (or Flight) Recorder☆40Updated last year
- A co-simulation framework for reasearching cybersecurity in power grids.☆26Updated 4 months ago
- unix_collector is a Live Response collection script for Incident Response on UNIX-like systems using native binaries. Supports AIX, Andro…☆41Updated 8 months ago
- Tor onion address lookup☆59Updated last month
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Updated 2 years ago
- ☆66Updated 3 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated 2 years ago
- A YARA & Malware Analysis Toolkit written in Rust.☆92Updated this week
- Hive v5 file decryption algorithm☆34Updated 3 years ago
- Yara Rules for Modern Malware☆78Updated last year
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Updated 7 months ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆75Updated 3 years ago
- Can you pay the ransom in your country?☆14Updated 2 years ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated 2 years ago
- PowerShell Script Analyzer☆70Updated 2 years ago