swimlane / trawl
A utility to trawl phishing domains and attempt to identify phishing kits as well as other malicious activity
☆36Updated 3 years ago
Alternatives and similar repositories for trawl:
Users that are interested in trawl are comparing it to the libraries listed below
- A collection of typical false positive indicators☆55Updated 4 years ago
- pocket guide for core threat hunting concepts☆23Updated 5 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- Website crawler with YARA detection☆88Updated last year
- pollen - A command-line tool for interacting with TheHive☆35Updated 5 years ago
- Triage automation for suspect URLs☆13Updated 5 years ago
- An Incident Response tool that visualizes historic process execution evidence (based on Event ID 4688 - Process Creation Event) in a tree…☆60Updated 7 years ago
- Modular command-line threat hunting tool & framework.☆17Updated 4 years ago
- Powershell Functions to interact with TheHive-Project☆10Updated 5 years ago
- Simple yara rule manager☆66Updated 2 years ago
- Collection of scripts used to analyse malware or emails☆19Updated 4 years ago
- For storing of the volumes☆4Updated 5 years ago
- A YARA Rule Performance Measurement Tool☆59Updated last year
- ☆53Updated 4 years ago
- ☆39Updated 5 years ago
- Community modules for FAME☆65Updated 3 months ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆55Updated 3 months ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Yara rules to be used with the Burp Yara-Scanner extension☆48Updated 3 years ago
- Converting data from services like Censys and Shodan to a common data model☆49Updated 8 months ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆44Updated 3 years ago
- Validates yara rules and tries to repair the broken ones.☆39Updated 4 years ago
- References for FIRST CTI 2019 Symposium presentation☆22Updated 6 years ago
- Tools to search through massive amounts of data☆21Updated 5 months ago
- A rewrite of mactime, a bodyfile reader☆37Updated 9 months ago
- Collection of YARA signatures from individual research☆44Updated last year
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- This package allows for creating alerts in The Hive from emails retrieved from a Microsoft Exchange mailbox.☆12Updated 7 years ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago