shellsharks / assortedLinks
☆14Updated 9 months ago
Alternatives and similar repositories for assorted
Users that are interested in assorted are comparing it to the libraries listed below
Sorting:
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago
- Lightweight Python-Based Malware Analysis Pipeline☆36Updated 2 months ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆116Updated 4 years ago
- This is the official repository for Basic Malware Analysis Course☆20Updated 3 years ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆49Updated 2 years ago
- Command-line tool to search for malware samples in various repositories☆11Updated 3 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆40Updated 10 months ago
- URL fingerprinting made easy☆90Updated last year
- A resource for leveraging Windows and Sysmon event codes in threat hunting and incident response.☆20Updated last year
- SIEM-From-Scratch is a drop-in ELK based SIEM component for your Vagrant infosec lab☆37Updated 5 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Updated 4 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated 2 months ago
- Python API for interacting with sigma rules.☆54Updated 3 years ago
- ☆15Updated 3 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Updated last week
- ☆80Updated 2 years ago
- Cyber Threat Intelligence Appliance☆13Updated 3 years ago
- Network security visualization tool, showcasing live traffic between internal and external hosts in a real-time visualization.☆27Updated 2 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Updated 3 years ago
- Useful commands for infosec☆29Updated 2 years ago
- ☆29Updated 11 months ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Updated 3 years ago
- Visual Studio Code extension for MITRE ATT&CK☆54Updated last year
- Triaging Windows event logs based on SANS Poster☆42Updated 2 weeks ago
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆58Updated 2 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Updated 7 years ago
- YaraScanner is a file pattern-matching tool based on YARA rules.☆59Updated 2 years ago
- A quick reference guide for python script development in DFIR☆18Updated last year
- Bloodhound Portable for Windows☆53Updated 2 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago