strontic / xcyclopediaLinks
Encyclopedia for Executables
☆449Updated 3 years ago
Alternatives and similar repositories for xcyclopedia
Users that are interested in xcyclopedia are comparing it to the libraries listed below
Sorting:
- C# based evtx parser with lots of extras☆318Updated this week
- A repository of DFIR-related Mind Maps geared towards the visual learners!☆529Updated 2 years ago
- MAL-CL (Malicious Command-Line)☆316Updated 2 years ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆583Updated last year
- Parses $MFT from NTFS file systems☆256Updated 3 months ago
- Collection of private Yara rules.☆369Updated last month
- Sysmon EDR POC Build within Powershell to prove ability.☆226Updated 4 years ago
- $MFT directory tree reconstruction & FILE record info☆310Updated 10 months ago
- Forensics artefact collection tool for systems running Microsoft Windows☆421Updated 5 months ago
- Event Tracing For Windows (ETW) Resources☆396Updated 10 months ago
- A forensics tool to convert the data in the Windows srum (System Resource Usage Monitor) database to an xlsx spreadsheet.☆710Updated 2 months ago
- A repo that contains recursive directory listings (using PowerShell) of a vanilla (clean) install of every Windows OS version to compare …☆172Updated 9 months ago
- PurpleSharp is a C# adversary simulation tool that executes adversary techniques with the purpose of generating attack telemetry in monit…☆824Updated 8 months ago
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆741Updated 4 months ago
- Sysmon configuration file template with default high-quality event tracing☆507Updated this week
- Sophos-originated indicators-of-compromise from published reports☆627Updated 3 weeks ago
- ☆149Updated last year
- A wireshark plugin to instrument ETW☆565Updated 3 years ago
- Detection in the form of Yara, Snort and ClamAV signatures.☆237Updated 9 months ago
- Tools for hunting for threats.☆592Updated 4 months ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆855Updated 3 years ago
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆628Updated this week
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆627Updated last year
- #ThreatHunting #DFIR #Malware #Detection Mind Maps☆302Updated 3 years ago
- A collection of red team and adversary emulation resources developed and released by MITRE.☆516Updated 4 years ago
- Misc Threat Hunting Resources☆374Updated 2 years ago
- Repository of YARA rules made by Trellix ATR Team☆609Updated 5 months ago
- CyLR - Live Response Collection Tool☆686Updated 3 years ago
- A python script developed to process Windows memory images based on triage type.☆265Updated last year
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆381Updated 3 years ago