sandflysecurity / sandfly-entropyscanLinks
Entropy scanner for Linux to detect packed or encrypted binaries related to malware. Finds malicious files and Linux processes and gives output with cryptographic hashes.
☆165Updated last year
Alternatives and similar repositories for sandfly-entropyscan
Users that are interested in sandfly-entropyscan are comparing it to the libraries listed below
Sorting:
- YaraScanner is a file pattern-matching tool based on YARA rules.☆59Updated 2 years ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆28Updated last month
- Forensic Artifact Collection Tool Matrix☆91Updated 11 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆65Updated 3 years ago
- LOKI2 - Simple IOC and YARA Scanner☆102Updated 4 months ago
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆107Updated last year
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- Harvest Linux forensic data for operational triage of an event.☆51Updated last year
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆79Updated 4 months ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 8 months ago
- Yara Rules for Modern Malware☆79Updated last year
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 3 years ago
- Initial triage of Windows Event logs☆102Updated last year
- Visually inspect and force decode YARA and regex matches found in both binary and text data with colors. Lots of colors.☆140Updated last month
- QuickSand document and PDF malware analysis tool written in Python☆132Updated 3 weeks ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆170Updated 3 years ago
- Data visualization for blue teams☆126Updated 2 years ago
- THOR Thunderstorm Collectors☆25Updated last month
- IOCs published by Black Lotus Labs☆123Updated this week
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Updated 3 years ago
- Linux Evidence Acquisition Framework☆118Updated last year
- File analysis and management framework.☆89Updated 2 years ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆146Updated 2 years ago
- yara detection rules for hunting with the threathunting-keywords project☆150Updated 5 months ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆118Updated last year
- enpoint detection / live analysis & sandbox host / signatures quality test☆44Updated 4 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆77Updated 3 years ago
- Anything Sysmon related from the MSTIC R&D team☆156Updated last year
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆43Updated 4 months ago