sandflysecurity / sandfly-entropyscanLinks
Entropy scanner for Linux to detect packed or encrypted binaries related to malware. Finds malicious files and Linux processes and gives output with cryptographic hashes.
☆163Updated last year
Alternatives and similar repositories for sandfly-entropyscan
Users that are interested in sandfly-entropyscan are comparing it to the libraries listed below
Sorting:
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago
- YaraScanner is a file pattern-matching tool based on YARA rules.☆58Updated 2 years ago
- LOKI2 - Simple IOC and YARA Scanner☆102Updated 3 months ago
- simple YARA-based IOC scanner☆169Updated this week
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆26Updated last week
- Visually inspect and force decode YARA and regex matches found in both binary and text data with colors. Lots of colors.☆140Updated 3 weeks ago
- IOCs published by Black Lotus Labs☆122Updated 3 weeks ago
- QuickSand document and PDF malware analysis tool written in Python☆131Updated last month
- Yara Rules for Modern Malware☆79Updated last year
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆104Updated last year
- C2 Active Scanner☆60Updated last year
- Linux #rootkit and #malware revealer☆27Updated last year
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated last year
- Signature based honeypot detector tool written in Golang☆104Updated 6 months ago
- Linux Evidence Acquisition Framework☆118Updated last year
- enpoint detection / live analysis & sandbox host / signatures quality test☆44Updated 4 years ago
- Data visualization for blue teams☆126Updated 2 years ago
- Harvest Linux forensic data for operational triage of an event.☆51Updated last year
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆78Updated 2 years ago
- Detection Engineering with YARA☆87Updated last year
- Forensic Artifact Collection Tool Matrix☆91Updated 11 months ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆170Updated 2 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 3 years ago
- Automated YARA Rule Standardization and Quality Assurance Tool☆245Updated this week
- Lightweight Python-Based Malware Analysis Pipeline☆35Updated 3 weeks ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Updated 3 years ago
- Active C2 IoCs☆99Updated 2 years ago
- yara detection rules for hunting with the threathunting-keywords project☆150Updated 5 months ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆138Updated last year