NextronSystems / thor-lite
Fast IOC and YARA Scanner
☆79Updated 5 years ago
Alternatives and similar repositories for thor-lite:
Users that are interested in thor-lite are comparing it to the libraries listed below
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆73Updated 5 months ago
- Full of public notes and Utilities☆98Updated 2 months ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆114Updated last year
- ☆68Updated 2 months ago
- User Feedback Space of #MitreAssistant☆37Updated last year
- A collection of tips for using MISP.☆74Updated 4 months ago
- A curated list of KAPE-related resources☆166Updated this week
- Initial triage of Windows Event logs☆97Updated 10 months ago
- Repository of public reference frameworks for the DFIR community.☆116Updated last year
- ☆87Updated last year
- Digital Forensics Artifacts Knowledge Base☆81Updated 11 months ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆120Updated last year
- Forensic Artifact Collection Tool Matrix☆84Updated 5 months ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆165Updated last year
- Open IOC sharing platform☆56Updated 5 months ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆155Updated last month
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆77Updated 11 months ago
- A GeoIP lookup utility utilizing ipinfo.io services.☆87Updated last year
- The Threat Actor Profile Guide for CTI Analysts☆106Updated last year
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- ☆68Updated 4 months ago
- A repo hosting the Markua content for the EZ Tools manuals hosted on Leanpub☆70Updated last year
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆152Updated 3 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 2 years ago
- This repo is where I store my Threat Hunting ideas/content☆87Updated last year
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆30Updated 2 weeks ago
- ☆58Updated 2 years ago
- Technical add-on for Splunk related to TheHive/Cortex from TheHive project☆53Updated 2 weeks ago
- Cyber Underground General Intelligence Requirements☆92Updated last year
- Provides an advanced input.conf file for Windows and 3rd party related software with more than 70 different event log mapped to the MITRE…☆90Updated 2 months ago