nowsecure / mobile-incident-responseLinks
Mobile Incident Response Book
☆61Updated 9 years ago
Alternatives and similar repositories for mobile-incident-response
Users that are interested in mobile-incident-response are comparing it to the libraries listed below
Sorting:
- incident response tool for iOS devices☆49Updated 3 years ago
- A warehouse for your malware☆135Updated last month
- Kirjuri is a web application for managing cases and physical forensic evidence items.☆107Updated 4 years ago
- Read a plist file, write out any embedded plist files☆35Updated 10 years ago
- Phishing e-mail repository☆36Updated 5 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Updated 5 years ago
- A tool to perform various OSINT techniques, aggregate all the raw data, visualise it on a dashboard, and facilitate alerting and monitori…☆31Updated 7 years ago
- An OS X analyzer for Cuckoo Sandbox project☆57Updated 10 years ago
- Differential Analysis of Malware in Memory☆214Updated 8 years ago
- Shared yara rules☆30Updated 11 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 6 years ago
- POLAR☆74Updated 6 years ago
- Various public documents, whitepapers and articles about APT campaigns☆55Updated 9 years ago
- Collection of my Python Scripts☆41Updated 5 years ago
- URLCrazy☆31Updated 12 years ago
- Malware Control Monitor☆88Updated 10 years ago
- Static and automated/dynamic malware analysis☆47Updated 10 years ago
- Process HTTP Pcaps With YARA☆108Updated 12 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆107Updated 5 years ago
- Automation for VirusTotal☆31Updated 9 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 8 years ago
- Leak File Analyzer☆62Updated 8 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- ☆37Updated 8 years ago
- Megatron - A System for Abuse- and Incident Handling☆45Updated 8 years ago
- a collection of public yara rules☆25Updated 6 years ago
- SMB Auto authentication Vulnerability☆34Updated 9 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated 3 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 6 years ago
- ☆50Updated 9 years ago