oherrala / xipologyLinks
☆18Updated 2 years ago
Alternatives and similar repositories for xipology
Users that are interested in xipology are comparing it to the libraries listed below
Sorting:
- Use Markov Chains to obfuscate data as other data☆55Updated 9 years ago
- DocBleachShell is the integration of the great DocBleach, https://github.com/docbleach/DocBleach Content Disarm and Reconstruction tool i…☆21Updated 3 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 7 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 7 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆42Updated 7 years ago
- Splunk integration with MISP☆12Updated 7 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Updated 6 years ago
- ☆52Updated 7 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Updated 7 years ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- Home to the ActorTrackr source code☆24Updated 8 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 8 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 7 years ago
- Sysmon config for both Windows and Linux Devices. Windows one is a bit dated☆56Updated last year
- Historical Observations of Actionable Reputation Data☆13Updated 7 years ago
- Repository for my ATT&CK analysis research.☆70Updated 6 years ago
- Bro PCAP Processing and Tagging API☆28Updated 8 years ago
- Python-based cloud node for local use☆11Updated 7 years ago
- Development guide for Volatility Plugins☆22Updated 8 years ago
- A script to track malware IOCs with OSINT on Twitter.☆54Updated last year
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Updated 7 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Updated 6 years ago
- Credential Phish Analysis and Automation☆98Updated 7 years ago
- Automated install scripts for Cuckoo sandbox☆38Updated 8 years ago
- Generate ATT&CK Navigator layer file from PowerShell Empire agent logs