0xrawsec / gene
Signature engine for all your logs
☆167Updated last year
Alternatives and similar repositories for gene:
Users that are interested in gene are comparing it to the libraries listed below
- SysmonX - An Augmented Drop-In Replacement of Sysmon☆214Updated 5 years ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆102Updated 3 weeks ago
- ☆164Updated 4 years ago
- Anything Sysmon related from the MSTIC R&D team☆152Updated 10 months ago
- YARA rule analyzer to improve rule quality and performance☆98Updated last week
- simple YARA-based IOC scanner☆168Updated 2 months ago
- A VBA parser and emulation engine to analyze malicious macros.☆95Updated 2 weeks ago
- A repository that maps API calls to Sysmon Event ID's.☆118Updated 2 years ago
- An Inofficial Sysmon Version History (Change Log)☆32Updated 4 years ago
- Sigma Detection Rule Repository☆87Updated 4 years ago
- c2 traffic☆188Updated 2 years ago
- Golang Parser for Microsoft Event Logs☆101Updated 3 months ago
- HXTool is an extended user interface for the FireEye HX Endpoint product. HXTool can be installed on a dedicated server or on your physic…☆79Updated 9 months ago
- Sysmon EDR POC Build within Powershell to prove ability.☆224Updated 3 years ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆85Updated 2 years ago
- Random hunting ordiented yara rules☆95Updated 2 years ago
- A library for fast parse & import of Windows Eventlogs into Elasticsearch.☆85Updated 9 months ago
- Log newly created WMI consumers and processes to the Windows Application event log☆124Updated 7 years ago
- Script for parsing Symantec Endpoint Protection logs, VBNs, and ccSubSDK database.☆64Updated 2 years ago
- ☆40Updated 2 years ago
- Sigma rules from Joe Security☆208Updated 5 months ago
- Automatic YARA rule generation for Malpedia☆159Updated 2 years ago
- Research indicators and detection rules☆66Updated last year
- A tool for de-obfuscating PowerShell scripts☆68Updated 5 years ago
- A guide on how to write fast and memory friendly YARA rules☆142Updated 2 months ago
- Blueteam operational triage registry hunting/forensic tool.☆145Updated last year
- ATT&CK Remote Threat Hunting Incident Response☆200Updated 4 months ago
- Place for resources used during the Mordor Detection hackathon event featuring APT29 ATT&CK evals datasets☆137Updated 4 years ago
- Import specific data sources into the Sigma generic and open signature format.☆78Updated 2 years ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆165Updated 2 years ago