Neo23x0 / Loki2
LOKI2 - Simple IOC and YARA Scanner
☆87Updated 7 months ago
Alternatives and similar repositories for Loki2:
Users that are interested in Loki2 are comparing it to the libraries listed below
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆77Updated this week
- An opensource sigma conversion tool built using pysigma☆121Updated 3 months ago
- Rules generated from our investigations.☆192Updated this week
- Sigma rules to share with the community☆119Updated last month
- ☆67Updated last month
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (EXT4, XFS) journals (not systemd-journald), generates…☆58Updated last week
- Automated YARA Rule Standardization and Quality Assurance Tool☆200Updated this week
- A repository to share publicly available Velociraptor detection content☆138Updated this week
- A repository of my own Sigma detection rules.☆157Updated 6 months ago
- ☆87Updated last month
- Collection of Jupyter Notebooks by @fr0gger_☆159Updated last month
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆144Updated last month
- A python script developed to process Windows memory images based on triage type.☆261Updated last year
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆84Updated last month
- Active C&C Detector☆152Updated last year
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.☆165Updated this week
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆76Updated last year
- MISP Playbooks☆188Updated last month
- yara detection rules for hunting with the threathunting-keywords project☆110Updated 3 weeks ago
- The Sigma command line interface based on pySigma☆147Updated 3 weeks ago
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆132Updated last year
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆76Updated 4 months ago
- BlackBerry Threat Research & Intelligence☆98Updated last year
- Intel Retrieval Augmented Generation (RAG) Utilities☆90Updated last year
- Forensic Artifact Collection Tool Matrix☆83Updated 4 months ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆201Updated 2 years ago
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆86Updated last year
- YARA rule analyzer to improve rule quality and performance☆97Updated 3 months ago
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆167Updated last month