Insikt-Group / Research
Research indicators and detection rules
☆66Updated last year
Alternatives and similar repositories for Research:
Users that are interested in Research are comparing it to the libraries listed below
- YARA rule analyzer to improve rule quality and performance☆96Updated last month
- Cloud Templates and scripts to deploy mordor environments☆129Updated 3 years ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆61Updated 2 years ago
- Random hunting ordiented yara rules☆95Updated last year
- Script for parsing Symantec Endpoint Protection logs, VBNs, and ccSubSDK database.☆64Updated 2 years ago
- Sigma Detection Rule Repository☆87Updated 4 years ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆99Updated last week
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆85Updated 2 years ago
- Collection of useful, up to date, Carbon Black Response Queries☆83Updated 4 years ago
- ☆65Updated this week
- ☆116Updated last year
- A repo to document API functions mapped to security events across diverse platforms☆75Updated 5 years ago
- Library of threat hunts to get any user started!☆42Updated 4 years ago
- JPCERT/CC public YARA rules repository☆106Updated 2 months ago
- A list of Mitre Caldera compatible emulation-plans☆14Updated 4 years ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆58Updated 2 years ago
- An Inofficial Sysmon Version History (Change Log)☆32Updated 4 years ago
- Automated detection rule analysis utility☆29Updated 2 years ago
- ☆86Updated last year
- Place for resources used during the Mordor Detection hackathon event featuring APT29 ATT&CK evals datasets☆134Updated 4 years ago
- Repository containing IOCs, CSV and MISP JSON from our blogs☆79Updated 3 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆44Updated 3 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆109Updated 4 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆61Updated last year
- Hunt malware with Volatility☆47Updated 9 months ago
- ☆5Updated 3 months ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆85Updated 2 years ago
- Userland API monitor for threat hunting☆57Updated 4 years ago
- Extract BITS jobs from QMGR queue and store them as CSV records☆75Updated last week
- HXTool is an extended user interface for the FireEye HX Endpoint product. HXTool can be installed on a dedicated server or on your physic…☆79Updated 7 months ago