nowsecure / mobile-incident-responseLinks
Mobile Incident Response Book
☆61Updated 9 years ago
Alternatives and similar repositories for mobile-incident-response
Users that are interested in mobile-incident-response are comparing it to the libraries listed below
Sorting:
- incident response tool for iOS devices☆49Updated 3 years ago
- Kirjuri is a web application for managing cases and physical forensic evidence items.☆107Updated 4 years ago
- A warehouse for your malware☆133Updated 12 years ago
- A Rekall interactive document for a Memory Analysis workshop/course.☆43Updated 8 years ago
- Malware Control Monitor☆87Updated 10 years ago
- Static and automated/dynamic malware analysis☆47Updated 9 years ago
- An OS X analyzer for Cuckoo Sandbox project☆57Updated 10 years ago
- ☆16Updated 10 years ago
- Automation for VirusTotal☆31Updated 9 years ago
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 6 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Updated 5 years ago
- ☆37Updated 8 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- URLCrazy☆31Updated 12 years ago
- a collection of public yara rules☆26Updated 5 years ago
- Collection of my Python Scripts☆41Updated 5 years ago
- Differential Analysis of Malware in Memory☆212Updated 8 years ago
- A tool to perform various OSINT techniques, aggregate all the raw data, visualise it on a dashboard, and facilitate alerting and monitori…☆31Updated 7 years ago
- Manage VT Alerts☆62Updated 8 years ago
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆68Updated 10 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago
- Various public documents, whitepapers and articles about APT campaigns☆55Updated 9 years ago
- Read a plist file, write out any embedded plist files☆35Updated 9 years ago
- ☆50Updated 9 years ago
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Updated 10 years ago
- Cyber Intel Management☆49Updated 7 years ago
- Collection of scripts for different malware analysis tasks☆76Updated 6 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆42Updated 8 years ago
- VPS infrastructure found in HT dumps☆26Updated 10 years ago
- Shared yara rules☆30Updated 11 years ago