CERN-CERT / pDNSSOC
Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.
☆50Updated last month
Alternatives and similar repositories for pDNSSOC:
Users that are interested in pDNSSOC are comparing it to the libraries listed below
- Mapping of open-source detection rules and atomic tests.☆123Updated 3 weeks ago
- ☆84Updated this week
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆51Updated 3 months ago
- MISP Playbooks☆183Updated this week
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆75Updated 3 months ago
- ☆124Updated last week
- Open Threat-Informed Detection Engineering☆37Updated last month
- A collection of tips for using MISP.☆74Updated 2 months ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆115Updated last year
- God Mode Detection Rules☆134Updated 6 months ago
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆101Updated 4 months ago
- ☆70Updated 2 weeks ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆121Updated 6 months ago
- Rules shared by the community from 100 Days of YARA 2025☆29Updated 3 weeks ago
- HASH (HTTP Agnostic Software Honeypot)☆136Updated 9 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆118Updated 10 months ago
- Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the syn…☆31Updated 6 months ago
- Repository that contains a set of purposefully erroneous Yara rules.☆48Updated last year
- Forensic Artifact Collection Tool Matrix☆81Updated 3 months ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆74Updated 3 weeks ago
- The ultimate solution for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆22Updated 5 months ago
- ☆99Updated last month
- Interactive simulation of a fictional ransomware group's dashboard☆12Updated 4 months ago
- Repository of tools and resources for analyzing Docker containers☆62Updated last year
- The core backend server handling API requests and task management☆35Updated this week
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆143Updated last year
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆35Updated last month
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆67Updated last month
- CarbonBlack EDR detection rules and response actions☆71Updated 5 months ago