NextronSystems / TA-aurora
Splunk Technology-AddOn for Aurora Sigma-Based EDR Agent. It helps parse and configure the necessary inputs to neatly consume Aurora EDR Agent Alerts into Splunk.
☆13Updated 2 years ago
Alternatives and similar repositories for TA-aurora:
Users that are interested in TA-aurora are comparing it to the libraries listed below
- ☆34Updated 2 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- ☆27Updated 3 years ago
- ShellSweeping the evil.☆52Updated 10 months ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated last year
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- Repository for LNK stuff☆30Updated 2 years ago
- Automated detection rule analysis utility☆29Updated 2 years ago
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- ☆33Updated 3 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Updated 4 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- Indicators of Normality☆12Updated 2 years ago
- ☆44Updated last year
- This is a repo for fetching Applocker event log by parsing the win-event log☆30Updated 2 years ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- Collection of generic YARA rules☆16Updated 10 months ago
- Simple PowerShell script to enable process scanning with Yara.☆93Updated 2 years ago
- Continuous kerberoast monitor☆45Updated last year
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆38Updated last year
- ☆15Updated 4 years ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Updated 2 years ago
- General Content☆26Updated 9 months ago
- ☆41Updated last year
- Links to malware-related YARA rules☆15Updated 2 years ago
- Machine Interrogation To Identify Gaps & Techniques for Execution☆32Updated 2 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- A set of tools for collecting forensic information☆26Updated 5 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- Rapidly building a Windows 10 system to use for dynamic malware analysis (sandbox), sending data to Elastic Cloud.☆50Updated last year