rjhansen / nsrllookup
Checks with NSRL RDS servers looking for for hash matches
☆112Updated 3 years ago
Alternatives and similar repositories for nsrllookup:
Users that are interested in nsrllookup are comparing it to the libraries listed below
- ☆83Updated 2 years ago
- Static analysis tools for Microsoft Office Open XML files and documents☆68Updated 7 years ago
- Reconstruct process trees from event logs☆146Updated 4 years ago
- stoQ Public Plugins☆71Updated last year
- Extract common Windows artifacts from source images and VSCs☆66Updated 3 years ago
- InvestigationPlaybookSpec☆72Updated 7 years ago
- Python IOC Editor☆63Updated 9 years ago
- AuditParser☆58Updated 11 years ago
- PowerShell No Agent Hunting☆109Updated 6 years ago
- Python tools for IOC (Indicator of Compromise) handling☆96Updated 3 years ago
- Yet another registry parser☆130Updated 2 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- Some IR notes☆73Updated 8 years ago
- A collection of typical false positive indicators☆55Updated 4 years ago
- ☆82Updated 8 years ago
- Volatility plugins created by the author☆44Updated 9 years ago
- A dumb set of scripts for building a cuckoo rig☆61Updated 7 years ago
- Imports Alienvault OTX pulses to a MISP instance☆52Updated 3 years ago
- Yara rules for malware families seen as part of targeted threats project☆133Updated 8 years ago
- Windows Live Artifacts Acquisition Script☆185Updated 2 years ago
- PowerShell scripts for Hard Drive forensics and parsing Windows Artifacts☆56Updated 4 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆81Updated 7 years ago
- A modern Python-3-based alternative to RegRipper☆190Updated last month
- A set of Maltego transforms for VirusTotal Public API v2.0. This set has the added functionality of caching queries on a daily basis to s…☆80Updated 9 years ago
- A set of templates for documenting threat intelligence☆73Updated 11 years ago
- Fast incident overview☆39Updated 7 years ago