rjhansen / nsrllookup
Checks with NSRL RDS servers looking for for hash matches
☆112Updated 3 years ago
Alternatives and similar repositories for nsrllookup:
Users that are interested in nsrllookup are comparing it to the libraries listed below
- ☆82Updated 2 years ago
- InvestigationPlaybookSpec☆72Updated 7 years ago
- Collecting & Hunting for IOCs with gusto and style☆116Updated 6 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆105Updated 6 years ago
- stoQ Public Plugins☆71Updated last year
- Reconstruct process trees from event logs☆147Updated 4 years ago
- A set of templates for documenting threat intelligence☆74Updated 11 years ago
- Log Examination Tool☆26Updated 8 years ago
- Example programs used in the automating DFIR series☆64Updated 5 years ago
- Python IOC Editor☆62Updated 9 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 7 years ago
- Python tools for IOC (Indicator of Compromise) handling☆96Updated 3 years ago
- Some IR notes☆73Updated 8 years ago
- Parse Windows Prefetch files: Supports XP - Windows 10 Prefetch files☆115Updated 8 months ago
- Extract common Windows artifacts from source images and VSCs☆65Updated 3 years ago
- My Yara Rules Collection☆52Updated 9 years ago
- Network Forensics Bro scripts & pcap samples☆62Updated 10 years ago
- A warehouse for your malware☆134Updated 11 years ago
- Yet another registry parser☆130Updated 2 years ago
- PE Import Hash Generator☆75Updated 7 years ago
- A collection of typical false positive indicators☆55Updated 4 years ago
- A dumb set of scripts for building a cuckoo rig☆61Updated 7 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆107Updated 4 years ago
- Static analysis tools for Microsoft Office Open XML files and documents☆68Updated 7 years ago
- PowerShell No Agent Hunting☆109Updated 6 years ago
- Repository of yara rules☆59Updated 2 years ago
- EVTXtract recovers and reconstructs fragments of EVTX log files from raw binary data, including unallocated space and memory images.☆192Updated 4 years ago
- Python interface to the CRITs API☆22Updated 7 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆60Updated 5 years ago