threatcat-ch / malware-analysis-pipeline
Lightweight Python-Based Malware Analysis Pipeline
☆29Updated last month
Related projects ⓘ
Alternatives and complementary repositories for malware-analysis-pipeline
- The core backend server handling API requests and task management☆31Updated 2 weeks ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆62Updated 2 years ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆27Updated last month
- ShellSweeping the evil.☆52Updated 5 months ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆63Updated 9 months ago
- A home for detection content developed by the delivr.to team☆59Updated last week
- Forensic Artifact Collection Tool Matrix☆75Updated 2 weeks ago
- BlackBerry Threat Research & Intelligence☆93Updated last year
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 2 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 3 years ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆66Updated last week
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated last year
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆38Updated 2 years ago
- C2 Active Scanner☆49Updated 5 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆49Updated 6 months ago
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- A specification and style guide for YARA rules☆37Updated 9 months ago
- Track progress and keep notes while working through likethecoins' CTI Self Study Plan☆28Updated 2 years ago
- ☆41Updated 7 months ago
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆24Updated 4 months ago
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆85Updated last year
- ☆83Updated 3 months ago
- Simple PowerShell script to enable process scanning with Yara.☆90Updated 2 years ago
- Yara Rules for Modern Malware☆67Updated 8 months ago
- Repository that contains a set of purposefully erroneous Yara rules.☆48Updated 10 months ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆50Updated last year
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆68Updated last year
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆31Updated 3 weeks ago
- simple webapp for converting sigma rules into siem queries using the pySigma library☆47Updated last year
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago