rapid7 / Rapid7-LabsView external linksLinks
Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence, research and analytics.
☆76Dec 15, 2025Updated last month
Alternatives and similar repositories for Rapid7-Labs
Users that are interested in Rapid7-Labs are comparing it to the libraries listed below
Sorting:
- Indicators of compromise☆17Jan 29, 2026Updated 2 weeks ago
- Here are some tools I developed to help analyze malware☆12Nov 8, 2023Updated 2 years ago
- USN Journal full path builder☆65Sep 16, 2024Updated last year
- LILO based Pulse Secure appliance disk image decryptor☆13Mar 20, 2024Updated last year
- Migrate team-managed project issues between two JIRA Cloud accounts☆12Nov 12, 2024Updated last year
- Forensic cheatsheets for use with cheat☆15Dec 2, 2021Updated 4 years ago
- Malformed Access Log to CSV - Convert Web Server Access Logs to CSV☆18Sep 3, 2024Updated last year
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆18Mar 3, 2022Updated 3 years ago
- CryptnetURLCacheParser is a tool to parse CryptAPI cache files☆20Aug 3, 2024Updated last year
- ☆17Jan 22, 2026Updated 3 weeks ago
- Publicly shareable windows event log message data☆28Nov 29, 2019Updated 6 years ago
- Documentation site for Velociraptor☆61Updated this week
- Python script for parsing ESET (NOD32) virlog.dat file.☆14Sep 28, 2017Updated 8 years ago
- Welcome to the SEKOIA.IO Community repository!☆176Feb 6, 2026Updated last week
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Jun 27, 2025Updated 7 months ago
- Repo that hold write-ups of various research projects I did and/or overall InfoSec things I investigated/researched.☆21Jan 5, 2025Updated last year
- Yara Rules for Modern Malware☆78Mar 3, 2024Updated last year
- Google Filestream Forensic Tool☆22Mar 10, 2022Updated 3 years ago
- A collection of curated YARA rules used as part of the Filescan.io service☆22Feb 4, 2026Updated last week
- ☆48Feb 1, 2026Updated last week
- ☆15Jul 20, 2022Updated 3 years ago
- ☆25May 13, 2019Updated 6 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 2 years ago
- A non-math, but still technical, guide to cryptography☆24Jul 24, 2020Updated 5 years ago
- Analyse MSI files for vulnerabilities☆143Aug 30, 2024Updated last year
- Cyber Underground General Intelligence Requirements☆97Feb 2, 2024Updated 2 years ago
- ☆54Feb 2, 2026Updated last week
- ☆24Mar 12, 2025Updated 11 months ago
- ☆67Sep 1, 2023Updated 2 years ago
- Library of threat hunts to get any user started!☆48Sep 4, 2020Updated 5 years ago
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- An experiment to address digital intelligence archiving on offensive engagements.☆26Sep 30, 2020Updated 5 years ago
- ☆22Jul 7, 2023Updated 2 years ago
- ☆12Feb 24, 2023Updated 2 years ago
- IOCs for various malware families☆11Jul 18, 2024Updated last year
- A bunch of library code that can easily be included in new/prototype projects with few (usually zero) dependencies, even on themselves.☆12Jul 26, 2020Updated 5 years ago
- A GUI application for managing Solo v2 security keys☆11Updated this week
- Tools for preservation of floppy disks☆11Nov 22, 2025Updated 2 months ago
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago