MHaggis / ShellSweep
ShellSweeping the evil.
☆49Updated 3 months ago
Related projects: ⓘ
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 2 years ago
- Yara Rules for Modern Malware☆68Updated 6 months ago
- Placeholder for my detection repo and misc detection engineering content☆43Updated 10 months ago
- Simple PowerShell script to enable process scanning with Yara.☆86Updated last year
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆57Updated last year
- Test case indexes☆35Updated 2 months ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆66Updated 9 months ago
- A collection of Sigma rules organized by MITRE ATT&CK technique☆15Updated 3 years ago
- ☆25Updated 3 years ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated last year
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated last year
- A tool to support the reporting of Authenticode Certificates by reducing the effort on individuals to report.☆22Updated 3 weeks ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆48Updated 5 months ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆34Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆48Updated last year
- General Content☆19Updated 2 months ago
- Library of threat hunts to get any user started!☆40Updated 4 years ago
- Carbon Black TAU Excel 4 Macro Analysis☆36Updated 7 months ago
- yara detection rules for hunting with the threathunting-keywords project☆75Updated last week
- ☆79Updated last year
- ☆34Updated last year
- YARA rule analyzer to improve rule quality and performance☆93Updated 9 months ago
- Baseline a Windows System against LOLBAS☆22Updated 4 months ago
- ☆42Updated last year
- Living off the False Positive!☆27Updated 3 weeks ago
- ☆36Updated this week
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆34Updated 9 months ago
- A home for detection content developed by the delivr.to team☆56Updated 2 weeks ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆57Updated last year
- ☆40Updated 5 months ago