DCSO / Blog_CyTecLinks
Repository to provide files related to our blog articles.
☆16Updated last week
Alternatives and similar repositories for Blog_CyTec
Users that are interested in Blog_CyTec are comparing it to the libraries listed below
Sorting:
- Links to malware-related YARA rules☆15Updated 2 years ago
- We publish indicators of compromise related to our stories here. See https://blog.team-cymru.com/ for more information.☆9Updated 3 years ago
- ☆15Updated 3 years ago
- Automate the regular transfer of AIS data into a MISP Server☆10Updated last year
- Provides a multi-platform Graphical User Interface for hashlookup☆12Updated 10 months ago
- Setting up a training environment for MISP☆12Updated 2 years ago
- Parser for Windows PowerShell script block logs☆13Updated 5 months ago
- Carving tool based in Radare2 & Yara☆16Updated 6 years ago
- ☆28Updated 4 months ago
- ☆22Updated 4 years ago
- This is a repository for the public blog with Labs indicators of compromise.☆10Updated 5 years ago
- Simplified go-cat agent for caldera☆10Updated last year
- Static configuration extractor for the Karton framework☆10Updated 4 months ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- ☆20Updated 4 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated last year
- Detection Rule License (DRL)☆17Updated 5 months ago
- Generate bulk YARA rules from YAML input☆22Updated 5 years ago
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Updated 4 months ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆25Updated 2 years ago
- Windows Security Logging☆43Updated 2 years ago
- Threat Detection Rules (Snort/Sigma/Yara)☆13Updated last year
- The Multiplatform Linux Sandbox☆15Updated last year
- Check IOC provided by a MISP instance on Suricata events☆17Updated 6 years ago
- Threat Mapping Catalogue☆17Updated 3 years ago
- Help fuzz various protocols and waits for ping backs Integrates LDAP server and JNDI payload☆11Updated 3 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Golang based web service to scan files with yara rules☆26Updated 7 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- Look into EDR events from network☆23Updated last month