A Python library and command line tools to provide interactive log visualization.
☆144Dec 27, 2022Updated 3 years ago
Alternatives and similar repositories for visualize_logs
Users that are interested in visualize_logs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A modular Python application to pull intelligence about malicious files☆123Dec 4, 2020Updated 5 years ago
- Some IR notes☆73Jul 23, 2016Updated 9 years ago
- (Unofficial) Python API for https://malwr.com/☆62Oct 13, 2016Updated 9 years ago
- A Python library to interface with a cuckoo-modified instance☆23Oct 31, 2016Updated 9 years ago
- Modified edition of cuckoo☆407Nov 21, 2017Updated 8 years ago
- Cosa Nostra, a FOSS graph based malware clusterization toolkit.☆232Jan 18, 2024Updated 2 years ago
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,240Aug 7, 2025Updated 7 months ago
- A Yara rule generator for finding related samples and hunting☆162Sep 11, 2022Updated 3 years ago
- A modular Python application to collect intelligence for malicious hosts.☆274Apr 13, 2021Updated 4 years ago
- Reconstruct process trees from event logs☆147Aug 12, 2020Updated 5 years ago
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆269Jun 15, 2021Updated 4 years ago
- revised "peHash: A Novel Approach to Fast Malware Clustering"☆21Jul 13, 2016Updated 9 years ago
- Web App for Volatility framework☆386Jan 13, 2026Updated 2 months ago
- Monitor JSON notifications feed from VT☆17Jun 13, 2017Updated 8 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Apr 21, 2020Updated 5 years ago
- Django web interface for managing Yara rules☆196Jul 28, 2018Updated 7 years ago
- Dump of organized knowledge on DFIR☆138Oct 4, 2021Updated 4 years ago
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Mar 27, 2017Updated 8 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Jul 29, 2020Updated 5 years ago
- A Tool for Automatic Analysis of Malware Behavior☆373May 8, 2019Updated 6 years ago
- ☆22Jan 2, 2018Updated 8 years ago
- An ICAP Server with yara scanner for URL and content.☆58Dec 19, 2024Updated last year
- Command-line Interface for Binar.ly☆39Jan 13, 2017Updated 9 years ago
- Modified edition of cuckoo☆272Sep 9, 2019Updated 6 years ago
- IRMA is an asynchronous & customizable analysis system for suspicious files.☆280Mar 1, 2023Updated 3 years ago
- Malware static analysis framework☆185Apr 1, 2020Updated 5 years ago
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- A set of Maltego transforms for VirusTotal Public API v2.0. This set has the added functionality of caching queries on a daily basis to s…☆82Nov 29, 2015Updated 10 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Aug 29, 2016Updated 9 years ago
- FAME Automates Malware Evaluation☆931Dec 16, 2025Updated 3 months ago
- Limon is a sandbox developed as a research project written in python, which automatically collects, analyzes, and reports on the run time…☆399May 20, 2016Updated 9 years ago
- VirusTotal Intelligence Notification Puller☆28Jun 29, 2016Updated 9 years ago
- Binary analysis and management framework☆1,556Jun 7, 2023Updated 2 years ago
- A Python RESTful API framework for online malware analysis and threat intelligence services.☆368May 21, 2024Updated last year
- Incident Response Forensic Framework☆612Nov 20, 2019Updated 6 years ago
- ph0neutria is a malware zoo builder that sources samples straight from the wild. Everything is stored in Viper for ease of access and man…☆302Apr 24, 2020Updated 5 years ago
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆156Dec 20, 2019Updated 6 years ago
- Network detector for Winnti malware☆21Mar 6, 2018Updated 8 years ago
- Tool to gather Threat Intelligence indicators from publicly available sources☆658Mar 14, 2019Updated 7 years ago