DCSO / Blog_CyTecLinks
Repository to provide files related to our blog articles.
☆16Updated 6 months ago
Alternatives and similar repositories for Blog_CyTec
Users that are interested in Blog_CyTec are comparing it to the libraries listed below
Sorting:
- Suricata rule and intel index☆33Updated 3 weeks ago
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Updated 10 months ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Carving tool based in Radare2 & Yara☆16Updated 7 years ago
- Automate the regular transfer of AIS data into a MISP Server☆10Updated last year
- Lightweight Python-Based Malware Analysis Pipeline☆36Updated 2 months ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆40Updated 10 months ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆30Updated 5 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- Command-line tool to search for malware samples in various repositories☆11Updated 3 years ago
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such…☆13Updated 2 months ago
- Simplified go-cat agent for caldera☆11Updated last year
- Tracking APT IOCs☆25Updated 5 years ago
- Go implementation of the Community ID flow hashing standard☆21Updated 7 months ago
- Provides a multi-platform Graphical User Interface for hashlookup☆12Updated last year
- ☆12Updated 3 years ago
- Yara rules for malicious javascript files from public repositories or written by me.☆13Updated 4 years ago
- Look into EDR events from network☆25Updated 2 weeks ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated 2 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆17Updated 4 years ago
- Threat Mapping Catalogue☆18Updated 4 years ago
- Pattern recognition for hosts, services, and content☆14Updated 3 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆38Updated 3 years ago
- A mini project to exfiltrate data via QR codes☆19Updated 2 weeks ago
- Repository resource threat intelligence for SOC☆10Updated 7 years ago
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Updated 3 years ago
- MISP sighting server is a fast sighting server to store and look-up sightings on attributes (network indicators, file hashes, system indi…☆15Updated last year
- Epimitheus is a tool that uses graphical database Neo4j for Windows Events visualization.☆19Updated 3 years ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆29Updated 2 months ago