DidierStevensSuite
TheHive
Our great sponsors
DidierStevensSuite | TheHive | |
---|---|---|
7 | 24 | |
1,807 | 3,166 | |
- | 2.3% | |
5.6 | 0.0 | |
5 days ago | over 1 year ago | |
Python | Scala | |
- | GNU Affero General Public License v3.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
DidierStevensSuite
-
Request: DidierStevens, I need a simple guide on how to scan pdf's for malware, I want to specifically make sure I include/implement all of DidierStevens additions to antivirus detection/research.
Didier Stevens is a famous security researcher, but his instructions on how to scan pdf's require the terminal & many commands. I am hostile to this in general as I think it can all be implemented in a simple one click scan tool, instead. Which is what I am looking for. Here are all his relevant links & antivirus/anti-malware projects & tutorials: https://github.com/DidierStevens/DidierStevensSuite
-
The Pdfalyzer is a tool for visualizing the inner tree structure of a PDF in large and colorful diagrams as well as scanning its internals for suspicious content
This tool was built to fill a gap in the PDF assessment landscape. Didier Stevens's pdfid.py and pdf-parser.py are still the best game in town when it comes to PDF analysis tools but they lack in the visualization department and also don't give you much to work with as far as giving you a data model you can write your own code around. Peepdf seemed promising but turned out to be in a buggy, out of date, and more or less unfixable state. And neither of them offered much in the way of tooling for embedded binary analysis. Thus I felt the world might be slightly improved if I strung together a couple of more stable/well known/actively maintained open source projects (AnyTree, PyPDF2, and Rich) into this tool.
-
What's in your toolkit?
Didier Stevens Suite - He has a tool for everything.
TheHive
-
Free Tech Tools and Resources - Connection Tracing, Throttling Tool, Log Search & More
TheHive is a versatile open-source solution for streamlining the investigation and prompt handling of security incidents. Seamlessly integrates with MISP to facilitate the transition from event analysis to investigation initiation, enabling efficient synchronization and export for collaborative threat detection and response. Moreover, coupling TheHive with Cortex empowers security professionals to efficiently analyze up to hundreds of observables. Timely-Lychee-5204 describes it as, "an open-source and scalable Security Incident Response Platform designed for handling incidents efficiently."
-
Monthly Security Checklist
TheHive/Cortex - https://thehive-project.org/
- Does anyone have experience with self-hosted endpoint security solutions?
- New blue team
-
Incident Response: What tool workflow do you use to collaborate on and document IR?
I haven't done any IR myself, but I was thinking something like TheHive Project (open source) or similar proprietary IR toolsets would be common. But over on r/blueteamsec I just saw this post, where people claimed to be using:
-
What companies/startups are using Scala (open source projects on github)?
There are so many of them in big data, e.g. Kafka, Spark, Flink, Delta, Snowplow, Finagle, Deequ, CMAK, OpenWhisk, Snowflake, TheHive, TVM-VTA, etc.
-
We are a security team with 20+ years of ethical hacking, and we've defended over 2 million attacks with Blumira. Ask Us Anything.
https://thehive-project.org/ - of course :)
-
I want to buy a SIEM, but I don't know which one
I also recommend checking out TheHive Project and Cortex. I used these in my SOC days and was super impressed with features, like linking incidents automatically based on reported IOCs. TheHive runs on elasticsearch under the hood, too.
-
What's in your toolkit?
We used to use TheHive and really liked it. The IoC tracking and case linking was very nice. And the Cortex integrations were awesome. And then manglement dictated a single ticket system to rule them all. Since they didn't bother to purchase the IR module, we're stuck with a subpar system which I'll leave nameless.
- Are there any free / open source Evidence Management Systems?
What are some alternatives?
Aurora-Incident-Response - Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders
velociraptor - Digging Deeper....
grr - GRR Rapid Response: remote live forensics for incident response
Wazuh - Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
dislocker - FUSE driver to read/write Windows' BitLocker-ed volumes under Linux / Mac OSX
Kuiper - Digital Forensics Investigation Platform
catalyst - Catalyst is an open source SOAR and ticket system that helps to automate alert handling and incident response processes
dfir-orc - Forensics artefact collection tool for systems running Microsoft Windows
CortexDocs - Documentation of Cortex
Shuffle - Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.
CyberChef - The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
scala-pet-store - An implementation of the java pet store using FP techniques in scala