DCSO / Blog_CyTecLinks
Repository to provide files related to our blog articles.
☆16Updated last month
Alternatives and similar repositories for Blog_CyTec
Users that are interested in Blog_CyTec are comparing it to the libraries listed below
Sorting:
- Threat Detection Rules (Snort/Sigma/Yara)☆13Updated last year
- Carving tool based in Radare2 & Yara☆16Updated 6 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Updated 6 months ago
- Automate the regular transfer of AIS data into a MISP Server☆10Updated last year
- Setting up a training environment for MISP☆12Updated 2 years ago
- Static configuration extractor for the Karton framework☆10Updated 6 months ago
- We publish indicators of compromise related to our stories here. See https://blog.team-cymru.com/ for more information.☆9Updated 3 years ago
- Yara rules for malicious javascript files from public repositories or written by me.☆13Updated 3 years ago
- Suricata rule and intel index☆31Updated last week
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆25Updated 2 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated last year
- ☆22Updated 4 years ago
- Links to malware-related YARA rules☆15Updated 2 years ago
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such…☆13Updated 3 months ago
- ☆15Updated 3 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Updated 2 years ago
- The Multiplatform Linux Sandbox☆16Updated last year
- Provides a multi-platform Graphical User Interface for hashlookup☆12Updated last year
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 5 months ago
- A mapping project between tags (annotations, labels) and domain names☆11Updated last year
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆23Updated 8 years ago
- Windows Security Logging☆43Updated 3 years ago
- Command-line tool to search for malware samples in various repositories☆11Updated 3 years ago
- nmap/ndiff based scanner with template based notification system in case of infrastructure changes☆18Updated 7 years ago
- This is a repository for the public blog with Labs indicators of compromise.☆10Updated 5 years ago
- Go implementation of the Community ID flow hashing standard☆20Updated 3 months ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 4 years ago
- ☆19Updated 2 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆77Updated last year