pandora-analysis / pandoraLinks
Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results
☆261Updated last week
Alternatives and similar repositories for pandora
Users that are interested in pandora are comparing it to the libraries listed below
Sorting:
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆165Updated last year
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆282Updated last year
- A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and contr…☆213Updated last week
- Malware repository component for samples & static configuration with REST API interface.☆355Updated last month
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆126Updated last year
- MISP Playbooks☆201Updated 3 months ago
- A python script developed to process Windows memory images based on triage type.☆262Updated last year
- ☆226Updated 2 years ago
- Threat Hunting tool about Sysmon and graphs☆333Updated 2 years ago
- 🧭 The artifactcollector is a customizable agent to collect forensic artifacts on any Windows, macOS or Linux system☆288Updated last month
- Rapidly Search and Hunt through Linux Forensics Artifacts☆193Updated last year
- Sublime rules for email attack detection, prevention, and threat hunting.☆310Updated this week
- Distributed malware processing framework based on Python, Redis and S3.☆426Updated 3 weeks ago
- Rules generated from our investigations.☆195Updated this week
- Jupyter Notebooks for the Blue Team☆144Updated 2 months ago
- A tool designed to hunt for Phishing Kit source code☆222Updated 2 years ago
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆717Updated 2 months ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆130Updated 3 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆202Updated 2 years ago
- Russia / Ukraine 2022 conflict related IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆174Updated 2 years ago
- Cisco Orbital - Osquery queries by Talos☆131Updated 9 months ago
- ☆201Updated last year
- A curated list of Awesome Threat Intelligence Blogs☆412Updated last week
- Artifact collection tool for *nix systems☆208Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆146Updated last year
- Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.☆314Updated 2 months ago
- LOKI2 - Simple IOC and YARA Scanner☆93Updated 10 months ago
- A repository of DFIR-related Mind Maps geared towards the visual learners!☆525Updated 2 years ago
- The Threat Actor Profile Guide for CTI Analysts☆107Updated last year
- A collection of companies that disclose adversary TTPs after they have been breached☆243Updated last year