Endpoint monitoring stack.
☆19Nov 5, 2015Updated 10 years ago
Alternatives and similar repositories for limacharlie
Users that are interested in limacharlie are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Event Log Analysis Tools☆31Sep 27, 2016Updated 9 years ago
- Logstash Input plugin by Blueliv☆27May 11, 2023Updated 2 years ago
- The new name is DeTT&CT☆24Jul 8, 2019Updated 6 years ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- A developer-friendly framework for exhaustive analysis of (PCAP and PE) files.☆15Nov 6, 2017Updated 8 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Apply Machine Learning and Game Theory to improve the security of the Turris network of CZ.NIC☆24Sep 24, 2019Updated 6 years ago
- ☆29Feb 16, 2021Updated 5 years ago
- Python API for the LimaCharlie.io service.☆23Mar 21, 2026Updated last week
- Carving tool based in Radare2 & Yara☆16Oct 30, 2018Updated 7 years ago
- Poison Ivy Appendix/Extras☆18Aug 21, 2013Updated 12 years ago
- Easily scan with multiple yara rules from different sources.☆14Mar 9, 2024Updated 2 years ago
- Yara matching in ElasticSearch.☆10Jun 12, 2018Updated 7 years ago
- Indicators of Compromise (IOCs) for malware we have researched☆11Aug 8, 2023Updated 2 years ago
- Docker compose Assemblyline 4 deployment (appliance and development)☆17Updated this week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- Load MISP events into memcached for log enrichment using logstash☆12Jul 10, 2020Updated 5 years ago
- study launch anywhere and bundle mismatch bug☆17Apr 23, 2023Updated 2 years ago
- excalidraw docker copy from gitlab.open-mind.space/pandel/excalidraw-docker☆13Feb 17, 2022Updated 4 years ago
- Windows DLL Loading Utility☆12Jun 11, 2020Updated 5 years ago
- openioc_scan Volatility Framework plugin☆44Feb 25, 2016Updated 10 years ago
- ALPChecker - a tool to detect spoofing and blinding attacks on the ALPC interaction☆13Feb 13, 2023Updated 3 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆24Apr 30, 2016Updated 9 years ago
- Bro analyzer that detects Google's QUIC protocol☆10Mar 2, 2021Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Safe wrappers for VFIO☆15Nov 30, 2021Updated 4 years ago
- blkinfo is a python package to list information about all available or the specified block devices.☆11Aug 6, 2023Updated 2 years ago
- DFIR notebooks GCIH Gold project, paper☆12Apr 30, 2015Updated 10 years ago
- A Python library and command line tools to provide interactive log visualization.☆144Dec 27, 2022Updated 3 years ago
- ☆13Aug 19, 2015Updated 10 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25May 3, 2018Updated 7 years ago
- Adds expandable sub-menu support to UITableView☆12Jan 19, 2018Updated 8 years ago
- Python wrapper around TCPdump for finer grained search criteria on Linux systems.☆14Jan 20, 2019Updated 7 years ago
- Detect and trap IP scanners☆11Mar 26, 2019Updated 7 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- This script is used for extracting DDE in docx and xlsx☆12Dec 8, 2017Updated 8 years ago
- Fast multipattern regular expression searching for digital forensics☆18Jul 31, 2019Updated 6 years ago
- ☆57Aug 19, 2024Updated last year
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- Custom rules for yara-integrated scans☆16Jun 5, 2013Updated 12 years ago
- A library to automate the conversion of linux-based VMs to a set of docker containers☆14Apr 10, 2015Updated 10 years ago
- A map displaying threat actors from the misp-galaxy☆33Jan 16, 2023Updated 3 years ago