lasq88 / socgholish_finder
☆14Updated 2 years ago
Alternatives and similar repositories for socgholish_finder:
Users that are interested in socgholish_finder are comparing it to the libraries listed below
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Updated last year
- Yara rules☆21Updated 2 years ago
- Scripts and lists to help generate YARA friendly string mutations☆21Updated 2 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Updated 3 months ago
- ☆34Updated 2 years ago
- Threat Box Assessment Tool☆19Updated 3 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34Updated 3 years ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated last year
- Quick ESXi Log Parser☆19Updated 4 months ago
- ☆20Updated last month
- Scripts to for ready-to-use Velociraptor instance deployment in Azure☆14Updated last year
- ☆15Updated 4 years ago
- my MSTICpy practice and custom tools repository☆11Updated 2 weeks ago
- This repository contains sample log data that were collected after running adversary simulations in Microsoft 365☆20Updated 6 months ago
- ☆15Updated 3 years ago
- Python based CLI for MalwareBazaar☆37Updated 6 months ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Updated 4 years ago
- Thor Artifacts for Velociraptor☆16Updated 10 months ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆22Updated 3 years ago
- VelociraptorMCP is a Model Context Protocol bridge for exposing LLMs to MCP clients.☆20Updated 3 weeks ago
- Low budget VirusTotal Intelligence Cosplay☆20Updated 3 years ago
- ☆14Updated 2 years ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Updated 2 years ago
- Generates YARA rules to detect malware using API hashing☆17Updated 4 years ago
- Malformed Access Log to CSV - Convert Web Server Access Logs to CSV☆17Updated 8 months ago
- ☆21Updated 2 years ago
- ☆38Updated 3 years ago
- Collection of scripts used to analyse malware or emails☆19Updated 4 years ago