silascutler / awesome-docker-malware-analysis
Repository of tools and resources for analyzing Docker containers
☆59Updated 11 months ago
Related projects ⓘ
Alternatives and complementary repositories for awesome-docker-malware-analysis
- C2 Active Scanner☆47Updated 4 months ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆116Updated 11 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆44Updated last week
- Repository that contains a set of purposefully erroneous Yara rules.☆48Updated 9 months ago
- Detection Engineering with YARA☆85Updated 10 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆49Updated 5 months ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆50Updated 2 weeks ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆71Updated 2 years ago
- The Threat Actor Profile Guide for CTI Analysts☆96Updated last year
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆49Updated 3 weeks ago
- BlackBerry Threat Research & Intelligence☆93Updated last year
- Sniffing out well-known threat groups☆28Updated 2 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆60Updated 3 months ago
- Cyber Underground General Intelligence Requirements☆90Updated 9 months ago
- ☆82Updated 2 months ago
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆94Updated 8 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆62Updated 2 years ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆74Updated 10 months ago
- Rules Shared by the Community from 100 Days of YARA 2023☆77Updated last year
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆62Updated 9 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆110Updated 7 months ago
- God Mode Detection Rules☆130Updated 3 months ago
- Harness the power of Splunk for your investigations☆76Updated 2 weeks ago
- CarbonBlack EDR detection rules and response actions☆71Updated 2 months ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆42Updated this week
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆80Updated 2 years ago
- A repository for tracking events related to the MOVEit Transfer Cl0p Campaign☆66Updated last year
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated last year
- HASH (HTTP Agnostic Software Honeypot)☆128Updated 6 months ago
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆72Updated this week