sandflysecurity / sandfly-entropyscanLinks
Entropy scanner for Linux to detect packed or encrypted binaries related to malware. Finds malicious files and Linux processes and gives output with cryptographic hashes.
☆162Updated last year
Alternatives and similar repositories for sandfly-entropyscan
Users that are interested in sandfly-entropyscan are comparing it to the libraries listed below
Sorting:
- LOKI2 - Simple IOC and YARA Scanner☆102Updated 2 months ago
- IOCs published by Black Lotus Labs☆122Updated this week
- File analysis and management framework.☆87Updated 2 years ago
- simple YARA-based IOC scanner☆169Updated last month
- YaraScanner is a file pattern-matching tool based on YARA rules.☆58Updated 2 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆65Updated 3 years ago
- Linux Evidence Acquisition Framework☆119Updated 11 months ago
- Visually inspect and force decode YARA and regex matches found in both binary and text data with colors. Lots of colors.☆137Updated this week
- Data visualization for blue teams☆126Updated 2 years ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆25Updated 2 years ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆257Updated 2 years ago
- enpoint detection / live analysis & sandbox host / signatures quality test☆44Updated 4 years ago
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆105Updated last year
- Harvest Linux forensic data for operational triage of an event.☆51Updated last year
- Forensic Artifact Collection Tool Matrix☆90Updated 10 months ago
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆146Updated last year
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆170Updated 2 years ago
- Yara Rules for Modern Malware☆79Updated last year
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆160Updated 3 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆132Updated 3 years ago
- Artifact collection tool for *nix systems☆210Updated last year
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆42Updated 3 months ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 7 months ago
- Detection Engineering with YARA☆87Updated last year
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆78Updated 3 months ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 3 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆116Updated last year
- BSidesRoc 2022 Linux Malware/Forensics Course☆77Updated 3 years ago
- Automated YARA Rule Standardization and Quality Assurance Tool☆241Updated 2 weeks ago