sandflysecurity / sandfly-entropyscanLinks
Entropy scanner for Linux to detect packed or encrypted binaries related to malware. Finds malicious files and Linux processes and gives output with cryptographic hashes.
☆158Updated last year
Alternatives and similar repositories for sandfly-entropyscan
Users that are interested in sandfly-entropyscan are comparing it to the libraries listed below
Sorting:
- Data visualization for blue teams☆126Updated 2 years ago
- QuickSand document and PDF malware analysis tool written in Python☆127Updated last month
- Rules Shared by the Community from 100 Days of YARA 2023☆77Updated 2 years ago
- LOKI2 - Simple IOC and YARA Scanner☆97Updated 2 weeks ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 3 years ago
- File analysis and management framework.☆88Updated last year
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆104Updated last year
- IOCs published by Black Lotus Labs☆122Updated last month
- YaraScanner is a file pattern-matching tool based on YARA rules.☆57Updated 2 years ago
- Initial triage of Windows Event logs☆101Updated last year
- yara detection rules for hunting with the threathunting-keywords project☆124Updated 2 months ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆250Updated 2 years ago
- Visually inspect and force decode YARA and regex matches found in both binary and text data. With Colors.☆132Updated 3 weeks ago
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆41Updated last month
- Automated YARA Rule Standardization and Quality Assurance Tool☆228Updated this week
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆64Updated 2 years ago
- simple YARA-based IOC scanner☆169Updated last week
- Forensic Artifact Collection Tool Matrix☆85Updated 8 months ago
- pySigma Elasticsearch backend☆54Updated last week
- enpoint detection / live analysis & sandbox host / signatures quality test☆44Updated 4 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 5 months ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 3 years ago
- Collection of rules created using YARA-Signator over Malpedia☆132Updated 8 months ago
- C2 Active Scanner☆59Updated last year
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆105Updated 2 months ago
- Signature based honeypot detector tool written in Golang☆98Updated 3 months ago
- firedrill is a malware simulation harness for evaluating your security controls☆186Updated last year
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆139Updated last year
- A guide on how to write fast and memory friendly YARA rules☆145Updated 5 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆146Updated last year