ANSSI-FR / AnoMark
Algorithme d'apprentissage statistique permettant de créer un modèle sur les lignes de commandes des évènements "Création de Processus", afin de détecter des anomalies dans les évènements futurs
☆83Updated last year
Alternatives and similar repositories for AnoMark:
Users that are interested in AnoMark are comparing it to the libraries listed below
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆147Updated 6 months ago
- The core backend server handling API requests and task management☆38Updated last week
- Convert Sigma rules to SIEM queries, directly in your browser.☆74Updated last week
- A collection of tips for using MISP.☆74Updated 4 months ago
- Rules Shared by the Community from 100 Days of YARA 2023☆76Updated 2 years ago
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (EXT4, XFS) journals (not systemd-journald), generates…☆63Updated 2 weeks ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆164Updated last year
- MISP Playbooks☆194Updated 2 months ago
- ☆87Updated 2 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆121Updated last year
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆33Updated 4 months ago
- IR drill plateform☆17Updated 3 weeks ago
- Xavier Framework is a user interface wrapper built on top of the Volatility(c) memory forensics framework.☆45Updated 2 years ago
- An open source platform to support analysts to organise their case and tasks☆70Updated last week
- Rules shared by the community from 100 Days of YARA 2024☆85Updated 3 months ago
- LOKI2 - Simple IOC and YARA Scanner☆89Updated 8 months ago
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆98Updated last year
- Guide journalisation Microsoft☆60Updated 9 months ago
- The Threat Actor Profile Guide for CTI Analysts☆106Updated last year
- Cyber Underground General Intelligence Requirements☆92Updated last year
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆95Updated last year
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆118Updated last year
- Powershell module for VMWare vSphere forensics☆150Updated 5 months ago
- An opensource sigma conversion tool built using pysigma☆122Updated 3 months ago
- JPCERT/CC public YARA rules repository☆106Updated 4 months ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆154Updated last week
- Cleanup of older MISP events can require some work until now☆25Updated 2 years ago
- A specification and style guide for YARA rules☆47Updated last year
- BlackBerry Threat Research & Intelligence☆98Updated last year
- A list of RMMs designed to be used in automation to build alerts☆110Updated this week