meirwah / awesome-malware-analysisLinks
A curated list of awesome malware analysis tools and resources
☆82Updated 9 years ago
Alternatives and similar repositories for awesome-malware-analysis
Users that are interested in awesome-malware-analysis are comparing it to the libraries listed below
Sorting:
- Dump of organized knowledge on DFIR☆135Updated 3 years ago
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.☆246Updated 4 years ago
- Incident Response Triage - Windows Evidence Collection for Forensic Analysis☆134Updated 9 years ago
- Term concordances for each course in the SANS DFIR curriculum. Used for automated index generation.☆67Updated 5 years ago
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆55Updated 4 years ago
- Tools to automate and/or expedite response.☆115Updated last year
- Slides and Other Resources from my latest Talks and Presentations☆24Updated 4 years ago
- Security Monitoring Resolution Categories☆138Updated 3 years ago
- A Splunk app to use MISP in background☆111Updated last week
- Tool to extract indicators of compromise from security reports in PDF format☆72Updated last year
- Collecting & Hunting for IOCs with gusto and style☆241Updated 4 years ago
- Scripts to facilitate filtering with Plaso☆126Updated 5 years ago
- Mark Baggett's (@MarkBaggett - GSE #15, SANS SEC573 Author) tool for detecting randomness using NLP techniques rather than pure entropy c…☆129Updated 2 years ago
- Set of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.☆178Updated last year
- Multithreaded threat Intelligence gathering built with Python3☆175Updated 7 years ago
- User guide of MISP☆272Updated 7 months ago
- Salt States for Configuring the SIFT Workstation☆104Updated 3 weeks ago
- Miscelaneous Dockers☆47Updated 3 years ago
- Collection of useful, up to date, Carbon Black Response Queries☆84Updated 4 years ago
- Tools from WFA 4/e, timeline tools, etc.☆141Updated last year
- Analyze binaries collected in VMware Carbon Black EDR against Yara rules.☆38Updated 2 years ago
- A system that creates a bogus web structure to entrap and delay web scanners☆60Updated 4 years ago
- ☆219Updated last year
- ☆116Updated last year
- All the IOC's I have gathered which are used directly involved coronavirus / covid-19 / SARS-CoV-2 cyber attack campaigns☆65Updated 4 years ago
- Splunk Boss of the SOC v1 data set.☆111Updated 7 years ago
- Web application to create indexes for GIAC certification examinations.☆143Updated 2 years ago
- The Cold Disk Quick Response (CDQR) tool is a fast and easy to use forensic artifact parsing tool that works on disk images, mounted driv…☆339Updated 3 years ago
- Office365 Log Analysis Framework☆81Updated 6 years ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆110Updated 5 years ago