Neo23x0 / FenrirLinks
Simple Bash IOC Scanner
☆744Updated 3 years ago
Alternatives and similar repositories for Fenrir
Users that are interested in Fenrir are comparing it to the libraries listed below
Sorting:
- Yara Rule Analyzer and Statistics☆375Updated 2 years ago
- CyLR - Live Response Collection Tool☆685Updated 3 years ago
- A set of Zeek scripts to detect ATT&CK techniques.☆597Updated last year
- Online hash checker for Virustotal and other services☆831Updated 3 months ago
- A collection of resources for Threat Hunters☆892Updated 9 months ago
- Incident Response Methodologies☆1,024Updated 6 years ago
- An informational repo about hunting for adversaries in your IT environment.☆1,795Updated 3 years ago
- Configuration files for the SOF-ELK VM☆1,605Updated 2 weeks ago
- Tools, techniques, cheat sheets, and other resources to assist those defending organizations and detecting adversaries☆455Updated 3 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,291Updated 5 months ago
- A Powershell incident response framework☆1,607Updated 2 years ago
- yarGen is a generator for YARA rules☆1,668Updated 3 months ago
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,160Updated last year
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,489Updated last week
- CLI tool to manage a SIFT Install☆420Updated 2 years ago
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆924Updated last year
- E-Mail Header Analyzer☆679Updated 2 years ago
- MISP trainings, threat intel and information sharing training materials with source code☆412Updated last month
- ☆1,079Updated 6 years ago
- A collection of sources of indicators of compromise.☆880Updated 2 months ago
- Scripts and a (future) library to improve users' interactions with the ATT&CK content☆587Updated last year
- Splunk Boss of the SOC version 2 dataset.☆385Updated 2 years ago
- Advanced Sysmon ATT&CK configuration focusing on Detecting the Most Techniques per Data source in MITRE ATT&CK, Provide Visibility into …☆807Updated last year
- ☆2,293Updated last year
- User guide of MISP☆271Updated 6 months ago
- Detect Tactics, Techniques & Combat Threats☆2,181Updated 2 weeks ago
- Re-play Security Events☆1,658Updated last year
- DFIRTrack - The Incident Response Tracking Application☆522Updated 10 months ago
- Cyber Analytics Repository☆949Updated 2 months ago
- Tools for hunting for threats.☆591Updated 2 months ago