CYBERCOM-Malware-Alert / IOCs
☆19Updated 2 years ago
Alternatives and similar repositories for IOCs:
Users that are interested in IOCs are comparing it to the libraries listed below
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆59Updated last week
- ☆28Updated this week
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆26Updated 2 weeks ago
- User Feedback Space of #MitreAssistant☆37Updated last year
- A MITRE ATT&CK Lookup Tool☆45Updated 11 months ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- Jupyter Notebooks for Cyber Threat Intelligence☆36Updated last year
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆31Updated last year
- Library of threat hunts to get any user started!☆42Updated 4 years ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆26Updated 3 weeks ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Updated 11 months ago
- ☆18Updated 2 years ago
- The Threat Actor Profile Guide for CTI Analysts☆106Updated last year
- CarbonBlack EDR detection rules and response actions☆71Updated 6 months ago
- Logbook for Digital Forensics and Incident Response☆50Updated 8 months ago
- This directory contains presentations and related materials of my speaking engagements. I also use this to record historical presentation…☆16Updated last month
- Python library for threat intelligence☆85Updated 2 months ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆85Updated 2 years ago
- Sigma detection rules for hunting with the threathunting-keywords project☆55Updated last month
- CSIRT Jump Bag☆26Updated 11 months ago
- ☆21Updated 2 years ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆118Updated last year
- Script to automate Linux live evidence collection☆27Updated 2 years ago
- ☆21Updated 3 years ago
- Azure function to insert MISP data in to Azure Sentinel☆31Updated 2 years ago
- Cyber Threats Detection Rules☆14Updated 3 months ago
- ☆10Updated last year
- C2 Active Scanner☆55Updated 9 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 3 months ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆76Updated last year