plast Logo

plast

0
Free
Visit Website

plast ("Programme Libre d’Analyse STatique" in French) is a command-line and heavily modular threat-hunting tool. It comes with several modules that allow processing of multiple data sources, trigger automatic action(s) upon detection, and produce customized output. plast's engine uses YARA under the hood, leveraged through multiprocessing tasks to perform rule-based detection on multiple types of input. The main goal of the plast project is to provide an efficient and effortless way to detect indicators of compromise during incident-response operations. It provides a comprehensive framework that easily allows adding functionalities to the tool in just a few lines of code, without worrying about efficiency and scalability. plast embeds all referenced modules in one single tool, allowing it to be used on the field as a standalone utility. plast is entirely written in Python 3, making it compatible with all GNU/Linux, BSD, and macOS distributions. Nevertheless, some minimal dependencies are required. Note that running plast on Microsoft Windows operating systems is totally untested at the moment.

FEATURES

ALTERNATIVES

Search engine for Windows executable files and hashes, providing insights into file prevalence, behavior, and security information.

An informational repo about hunting for adversaries in your IT environment.

Bearded Avenger is a cybersecurity tool with various integrations and deployment instructions available.

Tool for dataviz and statistical analysis of threat intelligence feeds, presented in cybersecurity conferences for measuring IQ of threat intelligence feeds.

A daily collection of IOCs from various sources, including articles and tweets.

A container of PCAP captures mapped to the relevant attack tactic

A collection of companies that disclose adversary TTPs after being breached, useful for analysis of intrusions.

Globally-accessible knowledge base of adversary tactics and techniques for cybersecurity.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved