intezer / linux-explorerLinks
Easy-to-use live forensics toolbox for Linux endpoints
☆407Updated last year
Alternatives and similar repositories for linux-explorer
Users that are interested in linux-explorer are comparing it to the libraries listed below
Sorting:
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Updated 5 years ago
- 16,432 Free Yara rules created by☆387Updated 6 years ago
- ph0neutria is a malware zoo builder that sources samples straight from the wild. Everything is stored in Viper for ease of access and man…☆301Updated 5 years ago
- Web App for Volatility framework☆383Updated last month
- A Python RESTful API framework for online malware analysis and threat intelligence services.☆368Updated last year
- Open Source Threat Intelligence Chat Bot☆323Updated 5 years ago
- A modular Python application to collect intelligence for malicious hosts.☆267Updated 4 years ago
- A low to medium interaction honeypot.☆469Updated last year
- Pentest Lab on OpenStack with Heat, Chef provisioning and Docker☆382Updated 7 years ago
- Red team Arsenal - An intelligent scanner to detect security vulnerabilities in company's layer 7 assets.☆414Updated 2 years ago
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆270Updated 4 years ago
- Modular file scanning/analysis framework☆620Updated 5 years ago
- Blue Team Scripts☆250Updated 6 years ago
- ☆516Updated 4 years ago
- First IDE for Nmap Script (NSE) Development.☆359Updated 5 years ago
- A fully functional DanderSpritz lab in 2 commands☆433Updated 6 years ago
- Web interface for the Volatility Memory Forensics Framework☆259Updated 7 years ago
- Next Generation Firewall Audit and Bypass Tool☆267Updated 8 years ago
- Differential Analysis of Malware in Memory☆212Updated 8 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆548Updated 2 years ago
- Remote forensics meta tool☆470Updated 5 months ago
- A collection of tools for dealing with TrickBot☆202Updated 7 years ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆475Updated 4 years ago
- Query and report user logons relations from MS Windows Security Events☆243Updated 7 years ago
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.☆355Updated 2 years ago
- Information released publicly by NCC Group's Cyber Incident Response Team☆476Updated 3 years ago
- Machinae Security Intelligence Collector☆529Updated last year
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆289Updated 7 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆372Updated 2 years ago
- Honeypot deployment made easy☆237Updated 6 years ago