Research indicators and detection rules
☆68Sep 20, 2023Updated 2 years ago
Alternatives and similar repositories for Research
Users that are interested in Research are comparing it to the libraries listed below
Sorting:
- Open source HIDS tailored for Microsoft Windows and Active Directory☆29Feb 13, 2026Updated 3 weeks ago
- Threat Box Assessment Tool☆19Aug 15, 2021Updated 4 years ago
- ☆23Jul 7, 2023Updated 2 years ago
- ☆10Jan 22, 2025Updated last year
- ☆10Dec 24, 2022Updated 3 years ago
- ☆48Mar 19, 2020Updated 5 years ago
- ☆24Sep 28, 2022Updated 3 years ago
- Volatility plugin for extracts configuration data of known malware☆495Dec 22, 2023Updated 2 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Oct 13, 2020Updated 5 years ago
- Useful windows tools for Blue, Red & Purple teams☆11Feb 22, 2026Updated last week
- Synapse Rapid Power-up for SinkDB☆11Jun 24, 2025Updated 8 months ago
- Athenz is a role-based authorization (RBAC) system for provisioning and configuration (centralized authorization) use cases as well as se…☆13Oct 29, 2019Updated 6 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 6 years ago
- Ossec cookbook for Chef, with secure & automated key management☆21Jun 13, 2013Updated 12 years ago
- Storage for the IOCs I collect☆11Mar 26, 2025Updated 11 months ago
- MISP Workbench☆28Oct 19, 2016Updated 9 years ago
- Import specific data sources into the Sigma generic and open signature format.☆79May 6, 2022Updated 3 years ago
- Threat Detection Rules (Snort/Sigma/Yara)☆14Jan 23, 2024Updated 2 years ago
- Integrating Sysinternals Autoruns’ logs into Security Onion☆31Feb 20, 2024Updated 2 years ago
- Attempt to replicate the functions of auto_rip by Corey Harrell in Python.☆12Aug 4, 2024Updated last year
- A tool to run a command when the target of a symlink changes☆16Apr 28, 2016Updated 9 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆33Apr 15, 2021Updated 4 years ago
- Various short scripts and tools used for Digital Forensics☆14Apr 13, 2025Updated 10 months ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- MalwareAnalysis☆12Dec 19, 2020Updated 5 years ago
- ☆14Aug 21, 2022Updated 3 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- viewssld is a free, open source, non-terminating SSLv2/SSLv3/TLS traffic decryption daemon for Snort, and other Network Intrusion Detecti…☆74Aug 13, 2017Updated 8 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 5 months ago
- Analyst tool for creating pivot maps of data sources☆16Sep 11, 2017Updated 8 years ago
- This is a repository that is meant to hold detections for various process injection techniques.☆34Mar 3, 2020Updated 6 years ago
- Userland API monitor for threat hunting☆58Mar 4, 2020Updated 6 years ago
- C2 Active Scanner☆59Jun 19, 2024Updated last year
- Command-line Interface for Binar.ly☆39Jan 13, 2017Updated 9 years ago
- Collection of scripts for use with Carbon Black Cb Response API☆14May 7, 2022Updated 3 years ago
- Web Application for domain name monitoring / alerting☆64Aug 1, 2024Updated last year
- Links to malware-related YARA rules☆15Sep 29, 2022Updated 3 years ago
- Modular command-line threat hunting tool & framework.☆17Jul 20, 2020Updated 5 years ago