hashlookup-forensic-analyser
misp-warninglists
Our great sponsors
hashlookup-forensic-analyser | misp-warninglists | |
---|---|---|
5 | 3 | |
116 | 475 | |
4.3% | 3.6% | |
5.5 | 8.3 | |
7 months ago | 3 days ago | |
Python | Python | |
GNU General Public License v3.0 or later | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
hashlookup-forensic-analyser
- hashlookup-forensic-analyser: Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https://circl.lu/services/hashlookup/
- Hashlookup-Forensic-Analyser
- Hashlookup forensic analyser version 0.8 released including a report functionality
- Hashlookup forensic analyser – finding known files for digital forensic triage
misp-warninglists
- Lists
-
Does anyone know what cdn4image.com is? I’ve searched but can’t find anything relevant to why it’s always showing up in my logs.
MSP Threat Intelligence list
-
Hashlookup-Forensic-Analyser
Indeed, specific files such as empty files but also many one or two bytes files are very recurring in many software sources. In the next version, we will include the MISP-warninglists such as the empty-hashes lists https://github.com/MISP/misp-warninglists/blob/main/lists/em... to warn about potential common files.
The tool can also work with the Bloom filter provided by hashlookup when the request to the API are not possible.
What are some alternatives?
APT-Hunter - APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the sea of windows event logs to decrease the time to uncover suspicious activity
MISP-QRadar-Integration - The Project can be used to integrate QRadar with MISP Threat Sharing Platform
RELY - RELY (Name composed on project members Romy, Esther, Lucille and Yassir) is a python tool developed to help a Digital Forensics Triage procedure on some Microsoft Windows devices.
misp-galaxy - Clusters and elements to attach to MISP events or attributes (like threat actors)
threathunting - A Splunk app mapped to MITRE ATT&CK to guide your threat hunts
ThreatIngestor - Extract and aggregate threat intelligence.
PurpleCloud - A little tool to play with Azure Identity - Azure Active Directory lab creation tool
Watcher - Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.
python-bloom-filter - Bloom filter for Python
ThePhish - ThePhish: an automated phishing email analysis tool