Pinned Repositories
AmIInfected
Yara scanner that enumerates process memory and then scans it for yara sigs. Not very user friendly currently
awesome-ctf
A curated list of CTF frameworks, libraries, resources and softwares
awesome-cve-poc
✍️ A curated list of CVE PoCs.
awesome-malware-analysis
A curated list of awesome malware analysis tools and resources.
awesome-yara
A curated list of awesome YARA rules, tools, and people.
Bashfuscator
A fully configurable and extendable Bash obfuscation framework. This tool is intended to help both red team and blue team.
beats
:tropical_fish: Beats - Lightweight shippers for Elasticsearch & Logstash
binaryalert
BinaryAlert: Serverless, Real-time & Retroactive Malware Detection
bincat
Binary code static analyser, with IDA integration. Performs value and taint analysis, type reconstruction, use-after-free and double-free detection
certstream-server
Certificate Transparency Log aggregation, parsing, and streaming service written in Elixir
gregcopenhaver's Repositories
gregcopenhaver/beats
:tropical_fish: Beats - Lightweight shippers for Elasticsearch & Logstash
gregcopenhaver/binaryalert
BinaryAlert: Serverless, Real-time & Retroactive Malware Detection
gregcopenhaver/adb
Adaptive Document Builder
gregcopenhaver/awesome-go
A curated list of awesome Go frameworks, libraries and software
gregcopenhaver/awesome-ida-x64-olly-plugin
A curated list of IDA x64DBG and OllyDBG plugins.
gregcopenhaver/content
This repository contains all Demisto content and from here we share content updates
gregcopenhaver/cowrie
Cowrie SSH/Telnet Honeypot
gregcopenhaver/Cuckoo-AWS
gregcopenhaver/django-weed
Weed-FS integration into Django as a storage
gregcopenhaver/flare-emu
gregcopenhaver/flare-ida
IDA Pro utilities from FLARE team
gregcopenhaver/gemini-python
A python client for the Gemini API and Websocket
gregcopenhaver/ghidra
gregcopenhaver/idenLib
idenLib - Library Function Identification
gregcopenhaver/MalConfig
This is part of a module for the framework that i'm constantly developing. Currently only information of the C2 are disclosed here.
gregcopenhaver/mkYARA
Generating YARA rules based on binary code
gregcopenhaver/MSRC-Security-Research
Security Research from the Microsoft Security Response Center (MSRC)
gregcopenhaver/PasteHunter
Scanning pastebin with yara rules
gregcopenhaver/pe-afl
gregcopenhaver/Shared
Shared Blogs and Notebooks
gregcopenhaver/shodan-python
The official Python library for Shodan
gregcopenhaver/signature-base
Signature base for my scanner tools
gregcopenhaver/SymStore
The history of Windows Internals via symbols.
gregcopenhaver/ThreatHunting
A Splunk app mapped to MITRE ATT&CK to guide your threat hunts
gregcopenhaver/tpotce
T-Pot Universal Installer and ISO Creator
gregcopenhaver/website-evidence-collector
The tool Website Evidence Collector (WEC) automates the website evidence collection of storage and transfer of personal data. https://edps.europa.eu/press-publications/edps-inspection-software_en
gregcopenhaver/WinDbg-Samples
Sample extensions, scripts, and API uses for WinDbg.
gregcopenhaver/yara
The pattern matching swiss knife
gregcopenhaver/zeek
Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.
gregcopenhaver/zip
Fork of Go's archive/zip to add reading/writing of password protected zip files.