DCSO / Blog_CyTec
Repository to provide files related to our blog articles.
☆16Updated last year
Alternatives and similar repositories for Blog_CyTec:
Users that are interested in Blog_CyTec are comparing it to the libraries listed below
- Provides a multi-platform Graphical User Interface for hashlookup☆12Updated 8 months ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 3 years ago
- ☆22Updated 4 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated last year
- Links to malware-related YARA rules☆15Updated 2 years ago
- Threat Detection Rules (Snort/Sigma/Yara)☆13Updated last year
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆75Updated last year
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Updated 2 months ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated last month
- ☆24Updated 2 years ago
- A mapping project between tags (annotations, labels) and domain names☆11Updated 11 months ago
- Analytics for Accounting logs from Network devices☆17Updated 4 years ago
- We publish indicators of compromise related to our stories here. See https://blog.team-cymru.com/ for more information.☆9Updated 3 years ago
- The Multiplatform Linux Sandbox☆15Updated last year
- Automate the regular transfer of AIS data into a MISP Server☆7Updated 9 months ago
- Suricata rule and intel index☆31Updated last week
- ☆15Updated 3 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Go implementation of the Community ID flow hashing standard☆20Updated 2 weeks ago
- Golang based web service to scan files with yara rules☆27Updated 7 years ago
- Simplified go-cat agent for caldera☆10Updated last year
- Carving tool based in Radare2 & Yara☆15Updated 6 years ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆22Updated 2 years ago
- Threat Mapping Catalogue☆17Updated 3 years ago
- ☆15Updated 7 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- ☆20Updated 4 years ago
- Yara rules for malicious javascript files from public repositories or written by me.☆12Updated 3 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆69Updated 3 years ago
- A dataset of phishing kits in the wild☆15Updated 9 months ago