ytisf / muninn
A short and small memory forensics helper.
☆52Updated 7 years ago
Alternatives and similar repositories for muninn:
Users that are interested in muninn are comparing it to the libraries listed below
- A warehouse for your malware☆134Updated 11 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49Updated 7 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Updated 10 years ago
- Simple DDE object detector☆56Updated 7 years ago
- Static and automated/dynamic malware analysis☆47Updated 9 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆41Updated 8 years ago
- Collection of my Python Scripts☆41Updated 4 years ago
- ☆68Updated 7 years ago
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆68Updated 10 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 7 years ago
- Volatility Plugins☆21Updated 9 years ago
- Malware Repository Framework☆100Updated 7 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆23Updated last year
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 7 years ago
- Some IR notes☆73Updated 8 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- Talk given at DerbyCon and RuxCon 2016☆22Updated 8 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Updated 4 years ago
- A collection of infosec related scripts and information.☆53Updated 5 months ago
- ☆16Updated 10 years ago
- ☆36Updated 8 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆31Updated 8 years ago
- Recurse through a registry, identifying values with large data -- a registry malware hunter☆44Updated 8 years ago
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 6 years ago
- Simple IP Information Tools for Reputation Data Analysis☆23Updated 6 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆126Updated last year
- ☆22Updated 7 years ago
- Automation for VirusTotal☆31Updated 8 years ago
- Process HTTP Pcaps With YARA☆102Updated 11 years ago