lmco / laikabossLinks
Laika BOSS: Object Scanning System
☆747Updated 6 months ago
Alternatives and similar repositories for laikaboss
Users that are interested in laikaboss are comparing it to the libraries listed below
Sorting:
- CRITs - Collaborative Research Into Threats☆904Updated 5 years ago
- DPS' Lightweight Investigation Notebook☆432Updated last year
- Incident Response Forensic Framework☆602Updated 5 years ago
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆469Updated 6 years ago
- Alienvault Labs Projects Random Stuff☆524Updated 3 years ago
- Documentation for the GRR Rapid Reponse framework☆303Updated 9 months ago
- DEPRECATED - USE v3 (bearded-avenger)☆228Updated 7 years ago
- Tool to gather Threat Intelligence indicators from publicly available sources☆660Updated 6 years ago
- Modular file scanning/analysis framework☆619Updated 5 years ago
- Honeypot Intelligence with Splunk☆254Updated 6 years ago
- Automated deployment scripts for the RockNSM network hunting distribution.☆455Updated 2 years ago
- File Scanning Framework☆293Updated 3 years ago
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆1,063Updated this week
- Malcom - Malware Communications Analyzer☆1,162Updated 7 years ago
- The main project for the Unfetter-Discover application. This is the project that will hold the configuration files, the docker-compose f…☆414Updated 2 years ago
- Protocol Analysis/Decoder Framework☆494Updated 2 years ago
- A Python library for parsing, manipulating, and generating STIX content.☆245Updated 3 years ago
- Python low-interaction honeyclient☆1,015Updated last week
- An open source framework for enterprise level automated analysis.☆395Updated 3 years ago
- A tool to retrieve malware directly from the source for security researchers.☆563Updated 7 years ago
- FAME Automates Malware Evaluation☆904Updated 2 months ago
- Main MineMeld documentation repo☆380Updated 7 years ago
- A tool for deploying and detecting use of Active Directory honeytokens☆507Updated 3 years ago
- Modified edition of cuckoo☆401Updated 7 years ago
- Malicious HTTP traffic explorer☆716Updated 2 years ago
- Threat Intelligence APIs☆279Updated last year
- Tool to extract indicators of compromise from security reports in PDF format☆436Updated 2 years ago
- SIFT☆512Updated last year
- Web interface for the Volatility Memory Forensics Framework☆259Updated 7 years ago
- ☆816Updated 8 years ago