vertrex / DFFLinks
DFF (Digital Forensics Framework)
☆11Updated 4 years ago
Alternatives and similar repositories for DFF
Users that are interested in DFF are comparing it to the libraries listed below
Sorting:
- ☆22Updated 4 years ago
- Toolset to analyze disks encrypted with McAFee FDE technology☆19Updated 4 years ago
- The Multiplatform Linux Sandbox☆16Updated last year
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34Updated 4 years ago
- Virustotal Data to Timesketch☆17Updated 6 years ago
- ☆12Updated 4 years ago
- ☆25Updated 2 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Updated last year
- Check IOC provided by a MISP instance on Suricata events☆18Updated 6 years ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Updated 6 years ago
- Automate the regular transfer of AIS data into a MISP Server☆10Updated last year
- ☆14Updated 7 years ago
- NTFS file system specimens☆13Updated 2 years ago
- Carving tool based in Radare2 & Yara☆16Updated 6 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆18Updated 4 years ago
- Plugins for the Viper Framework☆14Updated 5 years ago
- Python emulator for Excel XLM macros.☆18Updated 5 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Yara rules☆22Updated 2 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- MISP sighting server is a fast sighting server to store and look-up sightings on attributes (network indicators, file hashes, system indi…☆15Updated last year
- Steezy - Ghetto Yara Generation☆15Updated 2 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 5 years ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated last year
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 5 years ago
- Minimal Indicator Storage System☆11Updated 4 years ago
- ☆37Updated 3 years ago
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆11Updated last month