meirwah / awesome-malware-analysisLinks
A curated list of awesome malware analysis tools and resources
☆82Updated 9 years ago
Alternatives and similar repositories for awesome-malware-analysis
Users that are interested in awesome-malware-analysis are comparing it to the libraries listed below
Sorting:
- Dump of organized knowledge on DFIR☆135Updated 4 years ago
- Term concordances for each course in the SANS DFIR curriculum. Used for automated index generation.☆67Updated 5 years ago
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.☆251Updated 4 years ago
- Tools to automate and/or expedite response.☆115Updated last year
- Collecting & Hunting for IOCs with gusto and style☆241Updated 4 years ago
- Incident Response Triage - Windows Evidence Collection for Forensic Analysis☆136Updated 9 years ago
- Slides and Other Resources from my latest Talks and Presentations☆24Updated 2 months ago
- User guide of MISP☆281Updated 11 months ago
- Security Monitoring Resolution Categories☆138Updated 4 years ago
- Salt States for Configuring the SIFT Workstation☆106Updated last week
- Scripts to facilitate filtering with Plaso☆127Updated 5 years ago
- Mark Baggett's (@MarkBaggett - GSE #15, SANS SEC573 Author) tool for detecting randomness using NLP techniques rather than pure entropy c…☆129Updated 3 years ago
- Multithreaded threat Intelligence gathering built with Python3☆177Updated 7 years ago
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆55Updated 5 years ago
- ☆223Updated 2 years ago
- The Cold Disk Quick Response (CDQR) tool is a fast and easy to use forensic artifact parsing tool that works on disk images, mounted driv…☆344Updated 3 years ago
- ☆33Updated 2 years ago
- All-in-one bundle of MISP, TheHive and Cortex☆169Updated 3 years ago
- Set of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.☆182Updated last year
- A Splunk app to use MISP in background☆113Updated last month
- ☆116Updated last year
- ☆42Updated 4 years ago
- Tools for the Computer Incident Response Team☆148Updated 8 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆74Updated last year
- ☆194Updated last year
- ☆175Updated last year
- All the IOC's I have gathered which are used directly involved coronavirus / covid-19 / SARS-CoV-2 cyber attack campaigns☆65Updated 4 years ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆55Updated 3 years ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆65Updated 8 years ago
- Powershell Threat Hunting Module☆287Updated 9 years ago