sandflysecurity / sandfly-file-decloak
Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.
☆21Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for sandfly-file-decloak
- Converts Sigma detection rules to a Splunk alert configuration.☆13Updated 3 years ago
- Linux #rootkit and #malware revealer☆17Updated 3 months ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Updated 8 months ago
- Yara rules☆20Updated last year
- Threat hunting with EQL and Bro. This repo contains modifications to EQL and EQLLib to use BRO logs.☆8Updated 5 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Yara rules for malicious javascript files from public repositories or written by me.☆12Updated 3 years ago
- FastIR Agent is a Windows service to execute FastIR Collector on demand☆14Updated 7 years ago
- C# User Simulation☆33Updated 2 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 5 years ago
- Scans through registry hives outputting entropy values for key/values, dumps binary contents to files...we are looking for those "fileles…☆11Updated 5 years ago
- The Multiplatform Linux Sandbox☆15Updated 11 months ago
- Links to malware-related YARA rules☆14Updated 2 years ago
- Generate YARA rules for OOXML documents.☆37Updated last year
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆37Updated 4 months ago
- NTFS file system specimens☆14Updated last year
- THOR Thunderstorm Collectors☆24Updated 2 months ago
- ☆17Updated 3 months ago
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆25Updated 2 years ago
- Scripts and lists to help generate YARA friendly string mutations☆19Updated last year
- Can you pay the ransom in your country?☆14Updated 11 months ago
- Analytics for Accounting logs from Network devices☆16Updated 3 years ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆31Updated 3 weeks ago
- ☆22Updated 3 years ago
- Hunt for SQLite files used by various applications☆10Updated 2 weeks ago
- ☆15Updated 2 years ago
- Surface Analysis System on Cloud☆19Updated 11 months ago
- Indicators of Normality☆12Updated 2 years ago
- Penguin OS Forensic (or Flight) Recorder☆37Updated 4 months ago
- Steezy - Ghetto Yara Generation☆15Updated last year