jstnk9 / ETW-Almulahaza
ETW-Almulahaza is a consumer python-based tool that help you monitor ETW events of the operating system
☆13Updated 2 years ago
Alternatives and similar repositories for ETW-Almulahaza:
Users that are interested in ETW-Almulahaza are comparing it to the libraries listed below
- ☆14Updated 2 years ago
- ☆34Updated 2 years ago
- Yara rules☆21Updated 2 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Updated 4 years ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Updated 2 months ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- ☆12Updated 3 years ago
- ☆33Updated 3 years ago
- ☆15Updated 3 years ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆25Updated last year
- Hundred Days of Yara Challenge☆12Updated 2 years ago
- Scripts to for ready-to-use Velociraptor instance deployment in Azure☆13Updated last year
- Repository for LNK stuff☆30Updated 2 years ago
- Threat Box Assessment Tool☆19Updated 3 years ago
- Low budget VirusTotal Intelligence Cosplay☆20Updated 3 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34Updated 3 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆13Updated 3 years ago
- Mass Triage Tools☆20Updated 2 months ago
- Collection of scripts used to analyse malware or emails☆19Updated 4 years ago
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆13Updated 3 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆21Updated last year
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated last year
- Generates YARA rules to detect malware using API hashing☆17Updated 4 years ago
- Generate YARA rules for OOXML documents.☆38Updated last year
- PowerShell Memory Pulling script☆19Updated 10 years ago
- The "DFUR" Splunk application and data that was presented at the 2020 SANS DFIR Summit.☆12Updated 4 years ago
- A set of tools for collecting forensic information☆26Updated 5 years ago