srlabs / black-basta-busterLinks
☆99Updated last year
Alternatives and similar repositories for black-basta-buster
Users that are interested in black-basta-buster are comparing it to the libraries listed below
Sorting:
- ☆142Updated this week
- HASH (HTTP Agnostic Software Honeypot)☆137Updated last year
- acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.☆103Updated 2 weeks ago
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (EXT4, XFS) journals (not systemd-journald), generates…☆64Updated 2 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆150Updated 8 months ago
- Traps web spiders☆74Updated 4 years ago
- Knowledge base on cybercriminal concealment techniques☆69Updated last month
- Algorithme d'apprentissage statistique permettant de créer un modèle sur les lignes de commandes des évènements "Création de Processus", …☆83Updated last year
- ☆70Updated 2 months ago
- The Threat Actor Profile Guide for CTI Analysts☆107Updated last year
- MISP Playbooks☆201Updated 3 months ago
- God Mode Detection Rules☆134Updated 10 months ago
- 🏴☠️💰 Another Ransomware gang tracker☆205Updated this week
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆64Updated last year
- Automated YARA Rule Standardization and Quality Assurance Tool☆223Updated last week
- Forensic Artifact Collection Tool Matrix☆85Updated 6 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 5 months ago
- Canary Detection☆168Updated 2 weeks ago
- Repository of tools and resources for analyzing Docker containers☆65Updated last year
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆112Updated this week
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆114Updated last year
- Jupyter Notebooks for the Blue Team☆144Updated 2 months ago
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆101Updated last year
- DFIR ORC PARSER PROJECT☆25Updated 3 months ago
- A repository of credential stealer formats☆217Updated 2 months ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆155Updated 2 months ago
- Just some lists of Malware Configs☆170Updated 4 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆124Updated last year
- Cyber Underground General Intelligence Requirements☆92Updated last year
- ☆92Updated 3 weeks ago