Threat Detection Rules (Snort/Sigma/Yara)
☆14Jan 23, 2024Updated 2 years ago
Alternatives and similar repositories for detection
Users that are interested in detection are comparing it to the libraries listed below
Sorting:
- ☆15Nov 25, 2021Updated 4 years ago
- ☆10Dec 24, 2022Updated 3 years ago
- Debian and Red Hat packaging for SIE DNS sensor☆15May 5, 2023Updated 2 years ago
- a-ray-grass is a yara module that provides support for DCSO-format bloom filters in yara. In the context of hashlookup, it allows quickly…☆14Aug 19, 2022Updated 3 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 5 months ago
- Repository to provide files related to our blog articles.☆16May 26, 2025Updated 9 months ago
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆16Aug 10, 2022Updated 3 years ago
- Unpacking and decryption tools for the Emotet malware☆44Dec 5, 2021Updated 4 years ago
- Sigma detection rules for hunting with the threathunting-keywords project☆58Mar 2, 2025Updated 11 months ago
- A collection of typical false positive indicators☆56Dec 5, 2020Updated 5 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Oct 28, 2022Updated 3 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Nov 27, 2020Updated 5 years ago
- ☆11Feb 9, 2023Updated 3 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- GPS Tracker ,基于GPS、北斗的定位器,用于车辆、宠物、老人等需要定位追踪的场景☆24May 23, 2025Updated 9 months ago
- Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert☆37Nov 9, 2022Updated 3 years ago
- ETHICAL-HACKING☆12Dec 20, 2023Updated 2 years ago
- 🌌 Real-time threat detection for smart contracts☆10May 16, 2023Updated 2 years ago
- Debpic lets you easily build Debian packages in an isolated Docker environment.☆11Dec 6, 2024Updated last year
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆41Jan 31, 2025Updated last year
- Alternative password shadowing scheme☆10Feb 22, 2026Updated last week
- Contains research.splunk.com site code☆11Apr 10, 2024Updated last year
- ☆11Nov 26, 2025Updated 3 months ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- Automatically download youtube channels and programming from public German TV stations☆16Aug 2, 2022Updated 3 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- Event Query Router☆12Aug 9, 2019Updated 6 years ago
- Asset inventory of over 800 public bug bounty programs.☆12Jun 12, 2023Updated 2 years ago
- Modern Honey Network deployment with ansible☆12Jun 4, 2022Updated 3 years ago
- ☆96May 5, 2025Updated 9 months ago
- ☆44Jul 11, 2025Updated 7 months ago
- ☆10Dec 28, 2015Updated 10 years ago
- Yara rules I've written☆10Dec 9, 2015Updated 10 years ago
- Provides a multi-platform Graphical User Interface for hashlookup☆12Jul 12, 2024Updated last year
- Automating simple report creating of threat intelligence using ChatGPT and Greynoise API.☆10Oct 3, 2023Updated 2 years ago
- ☆12Feb 8, 2023Updated 3 years ago
- code for Graph Intelligence Enhanced Bi-Channel Insider Threat Detection paper☆13Aug 30, 2022Updated 3 years ago
- ☆15Apr 6, 2015Updated 10 years ago
- Rust SDK for Claude Code CLI - Build production-ready AI agents with type safety☆20Oct 24, 2025Updated 4 months ago