DCSO / Blog_CyTec
Repository to provide files related to our blog articles.
☆16Updated last year
Alternatives and similar repositories for Blog_CyTec:
Users that are interested in Blog_CyTec are comparing it to the libraries listed below
- Static configuration extractor for the Karton framework☆10Updated 3 months ago
- We publish indicators of compromise related to our stories here. See https://blog.team-cymru.com/ for more information.☆9Updated 3 years ago
- Links to malware-related YARA rules☆15Updated 2 years ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆23Updated 2 years ago
- Provides a multi-platform Graphical User Interface for hashlookup☆12Updated 9 months ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 3 years ago
- Simplified go-cat agent for caldera☆10Updated last year
- Threat Detection Rules (Snort/Sigma/Yara)☆13Updated last year
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 2 months ago
- ProcDot Malware Sandbox☆24Updated 4 months ago
- ☆12Updated 3 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Generate bulk YARA rules from YAML input☆22Updated 5 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated last year
- A mini project to exfiltrate data via QR codes☆19Updated this week
- ☆19Updated 11 months ago
- The Multiplatform Linux Sandbox☆15Updated last year
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Updated 4 years ago
- ☆22Updated 4 years ago
- Analytics for Accounting logs from Network devices☆17Updated 4 years ago
- Suricata rule and intel index☆30Updated 3 weeks ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆75Updated last year
- Carving tool based in Radare2 & Yara☆15Updated 6 years ago
- This repository contains generated contextual data utilized by pyattck.☆19Updated last month
- Threat Mapping Catalogue☆17Updated 3 years ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 5 years ago
- Look into EDR events from network☆23Updated last year
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- ☆23Updated last year
- Tracking APT IOCs☆25Updated 4 years ago