rjhansen / nsrllookupView external linksLinks
Checks with NSRL RDS servers looking for for hash matches
☆114Feb 26, 2021Updated 4 years ago
Alternatives and similar repositories for nsrllookup
Users that are interested in nsrllookup are comparing it to the libraries listed below
Sorting:
- ☆83Nov 22, 2022Updated 3 years ago
- Parses Java Cache IDX files☆40Feb 28, 2018Updated 7 years ago
- unXOR will search a XORed file and try to guess the key using known-plaintext attacks.☆145Apr 23, 2020Updated 5 years ago
- Pythonic interface to the Internet Storm Center / DShield API.☆28May 23, 2023Updated 2 years ago
- Python OpenIOC Editor☆18Dec 28, 2015Updated 10 years ago
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- File Scanning Framework☆295Sep 15, 2021Updated 4 years ago
- IDAPython scripts☆15Aug 24, 2017Updated 8 years ago
- A short and small memory forensics helper.☆52Oct 18, 2017Updated 8 years ago
- Malware Analysis Tool using Function Level Fuzzy Hashing☆191Dec 19, 2015Updated 10 years ago
- Modular file scanning/analysis framework☆621Oct 8, 2019Updated 6 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆439Feb 24, 2023Updated 2 years ago
- Collecting & Hunting for IOCs with gusto and style☆117Aug 9, 2018Updated 7 years ago
- Forensics triage tool relying on Volatility and Foremost☆25Dec 3, 2023Updated 2 years ago
- A tool designed for consistent and safe capture of off network web resources.☆39Mar 24, 2017Updated 8 years ago
- Malware static analysis framework☆185Apr 1, 2020Updated 5 years ago
- onigiri - remote malware triage script☆24Nov 5, 2015Updated 10 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆14Jan 6, 2019Updated 7 years ago
- Extract common Windows artifacts from source images and VSCs☆64May 10, 2021Updated 4 years ago
- Windows Live Artifacts Acquisition Script☆190Jun 20, 2022Updated 3 years ago
- Windows Prefetch parser. Supports all known versions from Windows XP to Windows 10.☆116Jan 8, 2025Updated last year
- My Quick Note of BlackHat 2015 Arsenal☆26Aug 13, 2015Updated 10 years ago
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆16Apr 23, 2025Updated 9 months ago
- Network white noise collector☆19Mar 23, 2016Updated 9 years ago
- Passive DHCP analyzer with OS fingerprinting on the LAN through DHCP☆13Nov 16, 2017Updated 8 years ago
- Emulates the Sysinternals Autoruns tool, but for DFIR purposes e.g. multi user processing☆55May 18, 2019Updated 6 years ago
- ☆280Apr 6, 2023Updated 2 years ago
- A GC link parser for both linkfiles and jumplists.☆18Oct 28, 2016Updated 9 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆107Apr 3, 2020Updated 5 years ago
- Network sinkhole for isolated malware analysis☆40Mar 5, 2018Updated 7 years ago
- Command line access to the Registry☆167Feb 5, 2026Updated last week
- Normalizer for honeypot data.☆46Jun 19, 2015Updated 10 years ago
- Get USB Devices from Registry hives☆22Nov 15, 2021Updated 4 years ago
- Differential Analysis of Malware in Memory☆216Apr 16, 2017Updated 8 years ago
- PEframe is a open source tool to perform static analysis on Portable Executable malware and malicious MS Office documents.☆619Aug 8, 2022Updated 3 years ago
- A modular Python application to pull intelligence about malicious files☆123Dec 4, 2020Updated 5 years ago
- An Open Source Malware Analysis Pipeline System☆157Jun 1, 2021Updated 4 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆197Sep 12, 2017Updated 8 years ago
- Sublime Malware Research Tool☆66Oct 28, 2024Updated last year