lasq88 / socgholish_finderLinks
☆14Updated 2 years ago
Alternatives and similar repositories for socgholish_finder
Users that are interested in socgholish_finder are comparing it to the libraries listed below
Sorting:
- Yara rules☆22Updated 2 years ago
- ☆34Updated 2 years ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated last year
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34Updated 4 years ago
- Scripts to for ready-to-use Velociraptor instance deployment in Azure☆14Updated 2 years ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Updated 2 years ago
- Quick ESXi Log Parser☆24Updated this week
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆34Updated 3 years ago
- ☆21Updated 5 months ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Updated last year
- C2 Active Scanner☆59Updated last year
- ☆15Updated 3 years ago
- Python based CLI for MalwareBazaar☆37Updated last month
- my MSTICpy practice and custom tools repository☆11Updated 3 months ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Updated 5 years ago
- A home for detection content developed by the delivr.to team☆69Updated last week
- Malformed Access Log to CSV - Convert Web Server Access Logs to CSV☆17Updated 11 months ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Updated 4 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 4 years ago
- ☆19Updated last month
- Python library to query various sources of threat intelligence for data on domains, file hashes, and IP addresses.☆31Updated last year
- The core backend server handling API requests and task management☆44Updated 2 weeks ago
- Collection of scripts used to analyse malware or emails☆20Updated 4 years ago
- THOR Thunderstorm Collectors☆25Updated last month
- Yara Rules for Modern Malware☆77Updated last year
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆31Updated 6 months ago
- Threat Box Assessment Tool☆19Updated 4 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Updated 6 months ago