Category: Forensics

Threat Modeling

hcltm v0.1.6 releases: Threat Modeling with HCL

hcltm Threat Modeling with HCL Overview There are many different ways in which a threat model can be documented. From a simple text file to more in-depth word documents, to fully instrumented threat models...

REW-sploit v0.5.1 releases: Dissecting Metasploit Attacks

REW-sploit Need help in analyzing Windows shellcode or attack coming from Metasploit Framework or Cobalt Strike (or maybe also other malicious or obfuscated code)? Do you need to automate tasks with simple scripting? Do you want help...

YARA rule analyzer

yaraQA: YARA rule analyzer

yaraQA YARA rule Analyzer to improve rule quality and performance Why? YARA rules can be syntactically correct but still dysfunctional. yaraQA tries to find and report these issues to the author or maintainer of...