NextronSystems / thunderstorm-collectorLinks
THOR Thunderstorm Collectors
☆25Updated this week
Alternatives and similar repositories for thunderstorm-collector
Users that are interested in thunderstorm-collector are comparing it to the libraries listed below
Sorting:
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated 2 years ago
- Scripts and lists to help generate YARA friendly string mutations☆22Updated 2 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Updated 4 years ago
- Public tools, scripts or code snippets that can help when working with our products☆46Updated 9 months ago
- Get-MiniTimeline - Triage Collection and Timeline Generation w/ KAPE☆32Updated last year
- ☆14Updated 2 years ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆86Updated last month
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆38Updated last month
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆34Updated 4 years ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 3 years ago
- ShellSweeping the evil.☆53Updated last year
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 5 years ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆32Updated 2 months ago
- ☆38Updated 4 years ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Updated 3 years ago
- A home for detection content developed by the delivr.to team☆73Updated 5 months ago
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆27Updated 3 years ago
- Library of threat hunts to get any user started!☆48Updated 5 years ago
- Simple PowerShell script to enable process scanning with Yara.☆98Updated 3 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago
- ☆35Updated last year
- ☆44Updated 6 months ago
- ☆17Updated 3 months ago
- ☆36Updated 3 years ago
- Yara Rules for Modern Malware☆78Updated last year
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Updated last year
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 4 years ago
- YARA rule analyzer to improve rule quality and performance☆110Updated 2 weeks ago
- Malformed Access Log to CSV - Convert Web Server Access Logs to CSV☆18Updated last year
- Blueteam operational triage registry hunting/forensic tool.☆149Updated 5 months ago