stvemillertime / CerebroLinks
Scripts and lists to help generate YARA friendly string mutations
☆21Updated 2 years ago
Alternatives and similar repositories for Cerebro
Users that are interested in Cerebro are comparing it to the libraries listed below
Sorting:
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆34Updated 3 years ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated last year
- ☆14Updated 2 years ago
- The core backend server handling API requests and task management☆43Updated 2 weeks ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Updated last year
- YARA rule analyzer to improve rule quality and performance☆102Updated 3 months ago
- Yara rules☆22Updated 2 years ago
- ShellSweeping the evil.☆53Updated last year
- ☆35Updated 8 months ago
- Powershell sandboxing utility☆18Updated this week
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Updated 2 years ago
- A home for detection content developed by the delivr.to team☆69Updated last month
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆79Updated last month
- Python based CLI for MalwareBazaar☆37Updated 8 months ago
- ☆22Updated 2 years ago
- JPCERT/CC public YARA rules repository☆110Updated 7 months ago
- Detection Engineering with YARA☆87Updated last year
- Windows file metadata / forensic tool.☆18Updated 9 months ago
- BlackBerry Threat Research & Intelligence☆98Updated last year
- Offensive Research Guide to Help Defense Improve Detection☆31Updated 2 years ago
- Script for parsing Symantec Endpoint Protection logs, VBNs, and ccSubSDK database.☆65Updated 2 years ago
- Hunt malware with Volatility☆47Updated this week
- ☆88Updated last year
- C2 Active Scanner☆59Updated last year
- Notes from my "Implementing a Kick-Butt Training Program: Blue Team GO!" talk☆12Updated 6 years ago
- THOR Thunderstorm Collectors☆24Updated 3 months ago
- This repository contains sample log data that were collected after running adversary simulations in Microsoft 365☆21Updated 9 months ago
- Yara Rules for Modern Malware☆77Updated last year
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆96Updated 2 years ago