pan-unit42 / public_tools
☆706Updated 2 years ago
Alternatives and similar repositories for public_tools:
Users that are interested in public_tools are comparing it to the libraries listed below
- Indicators from Unit 42 Public Reports☆708Updated this week
- Malware Configuration And Payload Extraction☆753Updated 3 months ago
- Utilities for MITRE™ ATT&CK☆1,020Updated 9 months ago
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,142Updated last year
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆464Updated 6 years ago
- Automatic Yara Rule Generation☆332Updated 9 years ago
- ☆426Updated last year
- Volatility plugin for extracts configuration data of known malware☆487Updated last year
- ☆507Updated 4 years ago
- Information released publicly by NCC Group's Cyber Incident Response Team☆477Updated 3 years ago
- PowerShell Obfuscation Detection Framework☆730Updated last year
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆720Updated 5 years ago
- Artifact analysis tools by JPCERT/CC Analysis Center☆458Updated 8 months ago
- ☆1,066Updated 5 years ago
- Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.☆911Updated last year
- Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.☆918Updated 3 months ago
- A Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.☆477Updated 4 years ago
- Modified edition of cuckoo☆396Updated 7 years ago
- Repository of modules and signatures contributed by the community☆326Updated 2 years ago
- Utilities for Sysmon☆1,508Updated last week
- Volatility plugins developed and maintained by the community☆357Updated 3 years ago
- PowerShell script for deobfuscating encoded PowerShell scripts☆424Updated 4 years ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆707Updated 2 years ago
- Wraps around various tools and provides some additional checks/information to produce a centralized report of a PE file.☆205Updated 11 years ago
- ☆275Updated last year
- Tool to extract indicators of compromise from security reports in PDF format☆433Updated 2 years ago
- Modular file scanning/analysis framework☆620Updated 5 years ago
- Modified edition of cuckoo☆270Updated 5 years ago
- Your Swiss Army knife to analyze malicious web traffic based on the popular Fiddler web debugger.☆641Updated 3 months ago
- Kaspersky's GReAT KLara☆706Updated 7 months ago