ninoseki / eml_analyzer
An application to analyze the EML file
☆272Updated last month
Related projects ⓘ
Alternatives and complementary repositories for eml_analyzer
- A tool designed to hunt for Phishing Kit source code☆215Updated last year
- Signatures and IoCs from public Volexity blog posts.☆324Updated this week
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆270Updated 3 months ago
- Repository of attack and defensive information for Business Email Compromise investigations☆230Updated 3 months ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆187Updated 4 months ago
- A python script developed to process Windows memory images based on triage type.☆258Updated 11 months ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆194Updated 2 years ago
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆588Updated 5 months ago
- A repository of DFIR-related Mind Maps geared towards the visual learners!☆514Updated 2 years ago
- Live forensic artifacts collector☆160Updated 4 months ago
- ☆190Updated last year
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆157Updated last year
- Automated YARA Rule Standardization and Quality Assurance Tool☆166Updated last week
- Ransomware leak site monitoring☆308Updated 2 years ago
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆681Updated this week
- Rules generated from our investigations.☆189Updated 3 weeks ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆473Updated 2 weeks ago
- MISP Playbooks☆174Updated this week
- Sublime rules for email attack detection, prevention, and threat hunting.☆256Updated this week
- Documentation and scripts to properly enable Windows event logs.☆558Updated last year
- Threat Hunting tool about Sysmon and graphs☆328Updated last year
- Tools for simulating threats☆178Updated last year
- MAL-CL (Malicious Command-Line)☆308Updated last year
- ☆194Updated 9 months ago
- Jupyter Notebooks for the Blue Team☆141Updated last year
- Purple Team Exercise Framework☆628Updated 10 months ago
- CLI tools for forensic investigation of Windows artifacts☆315Updated 3 weeks ago
- The goal of this repo is to archive artifacts from all versions of various OS's and categorizing them by type. This will help with artifa…☆555Updated last week
- The Threat Actor Profile Guide for CTI Analysts☆98Updated last year
- WTF are these binaries doing?! A list of benign applications that mimic malicious behavior.☆150Updated 3 weeks ago