A Python library and command line tools to provide interactive log visualization.
☆144Dec 27, 2022Updated 3 years ago
Alternatives and similar repositories for visualize_logs
Users that are interested in visualize_logs are comparing it to the libraries listed below
Sorting:
- Some IR notes☆73Jul 23, 2016Updated 9 years ago
- A Python library to interface with a cuckoo-modified instance☆23Oct 31, 2016Updated 9 years ago
- A modular Python application to pull intelligence about malicious files☆123Dec 4, 2020Updated 5 years ago
- Web App for Volatility framework☆390Jan 13, 2026Updated last month
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,231Aug 7, 2025Updated 6 months ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Apr 21, 2020Updated 5 years ago
- (Unofficial) Python API for https://malwr.com/☆62Oct 13, 2016Updated 9 years ago
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆270Jun 15, 2021Updated 4 years ago
- Dump of organized knowledge on DFIR☆138Oct 4, 2021Updated 4 years ago
- Malware static analysis framework☆185Apr 1, 2020Updated 5 years ago
- Django web interface for managing Yara rules☆196Jul 28, 2018Updated 7 years ago
- Reconstruct process trees from event logs☆147Aug 12, 2020Updated 5 years ago
- Modified edition of cuckoo☆406Nov 21, 2017Updated 8 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- Cosa Nostra, a FOSS graph based malware clusterization toolkit.☆231Jan 18, 2024Updated 2 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Jul 29, 2020Updated 5 years ago
- A Yara rule generator for finding related samples and hunting☆162Sep 11, 2022Updated 3 years ago
- Limon is a sandbox developed as a research project written in python, which automatically collects, analyzes, and reports on the run time…☆398May 20, 2016Updated 9 years ago
- A modular Python application to collect intelligence for malicious hosts.☆274Apr 13, 2021Updated 4 years ago
- An ICAP Server with yara scanner for URL and content.☆58Dec 19, 2024Updated last year
- IRMA is an asynchronous & customizable analysis system for suspicious files.☆279Mar 1, 2023Updated 3 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Aug 29, 2016Updated 9 years ago
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆156Dec 20, 2019Updated 6 years ago
- Collaborative malware analysis framework☆381Jan 22, 2019Updated 7 years ago
- A Tool for Automatic Analysis of Malware Behavior☆373May 8, 2019Updated 6 years ago
- FAME Automates Malware Evaluation☆929Dec 16, 2025Updated 2 months ago
- Modified edition of cuckoo☆272Sep 9, 2019Updated 6 years ago
- Incident Response Forensic Framework☆611Nov 20, 2019Updated 6 years ago
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Mar 27, 2017Updated 8 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆197Sep 12, 2017Updated 8 years ago
- Multithreaded threat Intelligence gathering built with Python3☆178Jan 23, 2018Updated 8 years ago
- Tool to gather Threat Intelligence indicators from publicly available sources☆658Mar 14, 2019Updated 6 years ago
- A set of Maltego transforms for VirusTotal Public API v2.0. This set has the added functionality of caching queries on a daily basis to s…☆82Nov 29, 2015Updated 10 years ago
- Binary analysis and management framework☆1,557Jun 7, 2023Updated 2 years ago
- Monitor JSON notifications feed from VT☆17Jun 13, 2017Updated 8 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Jul 5, 2016Updated 9 years ago
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Jan 30, 2018Updated 8 years ago
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- A Windows Event Processing Utility☆47Feb 21, 2018Updated 8 years ago