Laika BOSS: Object Scanning System
☆752Dec 16, 2024Updated last year
Alternatives and similar repositories for laikaboss
Users that are interested in laikaboss are comparing it to the libraries listed below
Sorting:
- File Scanning Framework☆294Sep 15, 2021Updated 4 years ago
- Vortex is a near real time IDS and network surveillance engine for TCP stream data.☆98Feb 2, 2017Updated 9 years ago
- Real-time, container-based file scanning at enterprise scale☆977Updated this week
- Protocol Analysis/Decoder Framework☆497Dec 19, 2022Updated 3 years ago
- An open source framework for enterprise level automated analysis.☆394Jun 27, 2022Updated 3 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆439Feb 24, 2023Updated 3 years ago
- Modular file scanning/analysis framework☆622Oct 8, 2019Updated 6 years ago
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- Script for generating Bro intel files from pdf or html reports☆77Dec 7, 2015Updated 10 years ago
- CRITs - Collaborative Research Into Threats☆910Jul 29, 2019Updated 6 years ago
- ☆17Nov 12, 2017Updated 8 years ago
- Modified edition of cuckoo☆272Sep 9, 2019Updated 6 years ago
- Fast Incident Response☆1,994Feb 17, 2026Updated 2 weeks ago
- Malicious HTTP traffic explorer☆723Mar 16, 2023Updated 2 years ago
- Bro-IDS scripts☆50Sep 12, 2016Updated 9 years ago
- ☆519Jan 26, 2021Updated 5 years ago
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆505Oct 21, 2022Updated 3 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- Binary analysis and management framework☆1,557Jun 7, 2023Updated 2 years ago
- Malspider is a web spidering framework that detects characteristics of web compromises.☆417Nov 4, 2022Updated 3 years ago
- Malcom - Malware Communications Analyzer☆1,164Nov 29, 2017Updated 8 years ago
- FAME Automates Malware Evaluation☆929Dec 16, 2025Updated 2 months ago
- DC3 Malware Configuration Parser (DC3-MWCP) is a framework for parsing configuration information from malware. The information extracted …☆340Feb 7, 2025Updated last year
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆1,113Feb 14, 2026Updated 3 weeks ago
- Indicator Extractor☆141Jul 14, 2018Updated 7 years ago
- Tool to gather Threat Intelligence indicators from publicly available sources☆658Mar 14, 2019Updated 6 years ago
- Incident Response Forensic Framework☆612Nov 20, 2019Updated 6 years ago
- Dockerfiles for NSM tools☆84Apr 14, 2017Updated 8 years ago
- An informational repo about hunting for adversaries in your IT environment.☆1,854Nov 17, 2021Updated 4 years ago
- ☆816May 24, 2017Updated 8 years ago
- Bro scripts written by CrowdStrike Services☆150May 3, 2021Updated 4 years ago
- Collaborative malware analysis framework☆381Jan 22, 2019Updated 7 years ago
- Flow-Indexer indexes flows found in chunked log files from bro,nfdump,syslog, or pcap files☆44May 9, 2024Updated last year
- IRMA is an asynchronous & customizable analysis system for suspicious files.☆279Mar 1, 2023Updated 3 years ago
- A tool for deploying and detecting use of Active Directory honeytokens☆509Jul 13, 2022Updated 3 years ago
- Currently not updated for WMIEvent module...☆262Feb 23, 2016Updated 10 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆197Sep 12, 2017Updated 8 years ago
- Loki - Simple IOC and YARA Scanner☆3,729Jan 12, 2026Updated last month
- Malware Configuration And Payload Extraction☆761Nov 22, 2024Updated last year