☆17Mar 22, 2018Updated 7 years ago
Alternatives and similar repositories for etplc
Users that are interested in etplc are comparing it to the libraries listed below
Sorting:
- ☆16Updated this week
- All Zero Nights 2016 'A threat hunter himself' stuff☆16Nov 18, 2016Updated 9 years ago
- Code for Rumal Backend that will interface with Thug Daemon☆11Nov 24, 2016Updated 9 years ago
- ☆10Dec 28, 2015Updated 10 years ago
- Thug's Rumāl: a Thug's dress & weapon☆37Jan 24, 2017Updated 9 years ago
- A browser extension that seamlessly integrates your yara match notifications into VirusTotal Intelligence.☆17Feb 8, 2015Updated 11 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Mar 11, 2016Updated 10 years ago
- Volatility plugin to help identify DoublePulsar implant by listing the array of pointers SrvTransaction2DispatchTable from the srv.sys dr…☆16Aug 14, 2017Updated 8 years ago
- Kippo configured to be a backdoored netscreen☆11Dec 22, 2015Updated 10 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- Use your Guitar Hero or Rock Band drums as a MIDI instrument (Windows)☆10Jan 24, 2016Updated 10 years ago
- Visualize your CRITs IOC's in Maltego☆12Jan 13, 2015Updated 11 years ago
- Find permanent WMI event consumers on endpoints that could be used by APT actors.☆17Jun 15, 2016Updated 9 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- This tool seeks asynchronously TrueCrypt key file using combinations of provided key files with provided password.☆48Mar 6, 2018Updated 8 years ago
- Manage VT Alerts☆62Oct 4, 2016Updated 9 years ago
- A set of Maltego transforms for VirusTotal Public API v2.0. This set has the added functionality of caching queries on a daily basis to s…☆82Nov 29, 2015Updated 10 years ago
- CRITs IOC Visualization in Maltego☆28Jan 8, 2015Updated 11 years ago
- Scripts for dealing with various ek's☆69Feb 2, 2017Updated 9 years ago
- Simple list of decrypt tools that could help recover data encrypted by ransomwares☆17Apr 1, 2016Updated 9 years ago
- Parse Yara rules and operate over them more easily.☆51Jan 7, 2019Updated 7 years ago
- Bash script for checking HTTP headers for security☆17Jan 16, 2014Updated 12 years ago
- YARA package for Sublime Text☆19Nov 30, 2025Updated 3 months ago
- ActionScript3 dynamic instrumentation tool☆36Mar 15, 2017Updated 9 years ago
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Aug 5, 2015Updated 10 years ago
- yara rules for cryptography detection☆31Apr 28, 2014Updated 11 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Jan 14, 2016Updated 10 years ago
- EditBox is a plugin for the Volatility Framework. It extracts the text from Windows Edit controls, that is, textboxes as generated by Win…☆24Jun 4, 2017Updated 8 years ago
- Script to perform Linux Memory Diff Analysis Using Volatility☆24Sep 20, 2015Updated 10 years ago
- Munk - Visualize Splunk Architecture in Maltego☆13Sep 19, 2014Updated 11 years ago
- Hunting IOCs all day every day...☆88Sep 26, 2023Updated 2 years ago
- ☆33Apr 20, 2022Updated 3 years ago
- threat language parser☆59Apr 20, 2015Updated 10 years ago
- Help summarize a PCAP file☆33Dec 27, 2011Updated 14 years ago
- REbus facilitates the coupling of existing tools that perform specific tasks, where one's output will be used as the input of others.☆25Oct 8, 2020Updated 5 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- onigiri - remote malware triage script☆24Nov 5, 2015Updated 10 years ago
- A rewrite of the Ukiyo-e.org website.☆33May 21, 2016Updated 9 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆439Feb 24, 2023Updated 3 years ago