tasox / EpimitheusLinks
Epimitheus is a tool that uses graphical database Neo4j for Windows Events visualization.
☆19Updated 3 years ago
Alternatives and similar repositories for Epimitheus
Users that are interested in Epimitheus are comparing it to the libraries listed below
Sorting:
- ☆36Updated 2 years ago
- ☆33Updated 3 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Updated 3 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Updated 3 years ago
- C# User Simulation☆33Updated 3 years ago
- Generate YARA rules for OOXML documents.☆38Updated 2 years ago
- A list of IOCs applicable to PoshC2☆24Updated 5 years ago
- Repository for LNK stuff☆31Updated 3 years ago
- Generates YARA rules to detect malware using API hashing☆17Updated 4 years ago
- ☆15Updated 4 years ago
- ☆27Updated 3 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- Yara rules☆22Updated 2 years ago
- Imphash-like calculation on Golang binaries☆49Updated 3 years ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆20Updated 3 years ago
- ☆23Updated 2 years ago
- A set of tools for collecting forensic information☆27Updated 5 years ago
- The repository accompanying the Buer Emulation workshop☆23Updated 4 years ago
- Documentation and parsers for different anti-virus quarantine formats.☆42Updated 5 years ago
- ☆23Updated 2 years ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆28Updated 2 years ago
- ☆27Updated 3 years ago
- Presentation materials for talks I've given.☆20Updated 6 years ago
- Splunk Technology-AddOn for Aurora Sigma-Based EDR Agent. It helps parse and configure the necessary inputs to neatly consume Aurora EDR …☆13Updated 3 years ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Updated 2 years ago
- Userland API monitor for threat hunting☆58Updated 5 years ago
- Cybersecurity Incidents Mind Maps☆34Updated 4 years ago
- Code and Slides of my BSides London 2019 presentation about Attacker Emulation using CALDERA☆22Updated 6 years ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆22Updated 3 years ago
- ☆46Updated 2 years ago