idaholab / EMVLinks
Exploit, Malware and Vulnerability Scoring Application
☆15Updated 2 years ago
Alternatives and similar repositories for EMV
Users that are interested in EMV are comparing it to the libraries listed below
Sorting:
- Remote / Onsite Security Assessment Jumpkit☆39Updated 2 years ago
- This repository has been archived in favor of https://github.com/idaholab/Malcolm-Test-Artifacts☆37Updated last year
- Public repository for Red Canary Research☆37Updated 5 years ago
- Carving tool based in Radare2 & Yara☆16Updated 7 years ago
- DFF (Digital Forensics Framework)☆11Updated 4 years ago
- Toolset to analyze disks encrypted with McAFee FDE technology☆19Updated 4 years ago
- Presentation Slides and Resources☆16Updated last year
- Visual Studio Code extension for MITRE ATT&CK☆55Updated last year
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Updated 3 years ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆50Updated last year
- Web Application for domain name monitoring / alerting☆65Updated last year
- AttackMatrix is a Python module and/or webpage to interact with and explore MITRE's ATT&CK's matrices.☆17Updated 2 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated last year
- unix_collector is a Live Response collection script for Incident Response on UNIX-like systems using native binaries. Supports AIX, Andro…☆39Updated 6 months ago
- Polyglot detector☆23Updated 6 months ago
- ☆37Updated 4 years ago
- TAPIR is a multi-user, client/server, incident response framework☆47Updated 3 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- A script that extracts embedded images from Office Open XML (OOXML) documents and generates image hash similarity graphs that cluster vis…☆21Updated 4 years ago
- Passive OS detection based on SYN packets without Transmitting any Data☆49Updated 2 years ago
- Yara rules to be used with the Burp Yara-Scanner extension☆48Updated 3 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated 2 months ago
- Placeholder for IRIS-H Digital Forensics Tool☆15Updated 7 years ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Updated 6 years ago
- Client library for the mwdb service by CERT Polska.☆42Updated 2 months ago
- Standardized Malware Analysis Tool☆56Updated 4 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Updated 2 years ago
- XOR Key Extractor☆51Updated last year
- Validates yara rules and tries to repair the broken ones.☆40Updated 5 years ago