trailofbits / osquery
SQL powered operating system instrumentation, monitoring, and analytics.
☆38Updated 2 weeks ago
Alternatives and similar repositories for osquery:
Users that are interested in osquery are comparing it to the libraries listed below
- A scalable search index for binary files☆117Updated 7 years ago
- ☆29Updated 6 years ago
- Malware Configuration And Payload Extraction☆18Updated 5 years ago
- CITL's static analysis engine for native code artifacts☆20Updated 3 years ago
- Crawl (~600K) labeled Portable Exe files from Microsoft Cabs☆13Updated 3 years ago
- MSR Project Freta☆77Updated 8 months ago
- Parsing of YARA rules into AST and building new rulesets in C++.☆124Updated this week
- Mimojas Firmware Toolkit for unpacking and analysis firmware images☆13Updated 4 years ago
- All TMF files that I extracted from Microsoft PDBs.☆12Updated 5 years ago
- Avalanche is a document generator which uses context-free grammars to generate randomized outputs for fuzz-testing.☆32Updated 3 years ago
- A sample PoC for container-aware exec events for osquery☆24Updated last year
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- An official book about Rizin☆77Updated last month
- ☆83Updated 2 years ago
- A FUSE module to mount captured network data☆37Updated last month
- bareflank based hypervisor with guest support☆60Updated 4 years ago
- ☆32Updated 9 months ago
- Hashashin: A Fuzzy Matching Tool for Binary Ninja☆93Updated last year
- A Ghidra extension for scripting with GraalVM languages, including Javascript, Python3, R, and Ruby.☆60Updated 3 years ago
- Interactive Virtual Machine Introspection☆18Updated 7 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- Cockroach is your primitive & immortal swiss army knife.☆47Updated 3 years ago
- pure Python binary analysis framework☆23Updated 6 years ago
- Approximate matching using Hierarchical Bloom Filter Trees. Based on mrsh-v2.☆12Updated 4 years ago
- SentinelOne's KeRnel Exploits Advanced Mitigations☆53Updated 6 years ago
- Exploit, Malware and Vulnerability Scoring Application☆12Updated last year
- Python command-line tool that uses nearest neighbor search methods for malware similarity analysis☆16Updated 6 years ago
- Very simple cross-platform utility to manage your git identities.☆10Updated 2 years ago
- Underconstrained symbolic execution for cryptography verification☆18Updated 4 years ago
- X86 disassembler benchmark☆60Updated 9 months ago