THOR Thunderstorm Collectors
☆25Feb 26, 2026Updated last week
Alternatives and similar repositories for thunderstorm-collector
Users that are interested in thunderstorm-collector are comparing it to the libraries listed below
Sorting:
- Scripts and lists to help generate YARA friendly string mutations☆22Apr 9, 2023Updated 2 years ago
- Python module to interact with THOR Thunderstorm service☆17Dec 5, 2025Updated 3 months ago
- THOR MITRE ATT&CK Framework Coverage☆25Jun 15, 2020Updated 5 years ago
- Simple SYSLOG client in Go☆22Jun 5, 2025Updated 9 months ago
- ☆21Apr 19, 2024Updated last year
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- CLI tool to compute the TypeRefHash for .NET binaries.☆19Nov 10, 2021Updated 4 years ago
- Ripple20 Critical Vulnerabilities - Detection Logic and Signatures☆12May 28, 2021Updated 4 years ago
- ☆11May 2, 2022Updated 3 years ago
- Imphash-like calculation on Golang binaries☆49Jul 2, 2022Updated 3 years ago
- Carving tool based in Radare2 & Yara☆16Oct 30, 2018Updated 7 years ago
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 3 months ago
- Menu for Thor scanner lite☆20Oct 24, 2025Updated 4 months ago
- SQL, IIS, Oh My...☆22Feb 24, 2025Updated last year
- ☆12Dec 23, 2021Updated 4 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Nov 27, 2020Updated 5 years ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Jan 18, 2023Updated 3 years ago
- Knowing which rule should trigger according to the redcannary test☆11Nov 23, 2024Updated last year
- ☆17Jan 22, 2026Updated last month
- Information about most important hunts which can be performed by Threat hunters while searching for any adversary/threats inside the orga…☆15May 18, 2019Updated 6 years ago
- Suricata rules to detect Winnti communication☆16Mar 5, 2018Updated 8 years ago
- Scripts for auto-configuration ikev2-ipsec-server for Routeros v7☆15Jan 13, 2023Updated 3 years ago
- Using QRadar API☆20Feb 23, 2018Updated 8 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Jun 23, 2018Updated 7 years ago
- Golang implementation of PyMISP-feedgenerator☆18Jul 31, 2022Updated 3 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Jan 20, 2023Updated 3 years ago
- Public tools, scripts or code snippets that can help when working with our products☆46Feb 11, 2026Updated 3 weeks ago
- Validates yara rules and tries to repair the broken ones.☆41Sep 5, 2020Updated 5 years ago
- A Yara Lua output script for Suricata☆20Apr 7, 2019Updated 6 years ago
- Data to test capa's code and rules.☆47Feb 17, 2026Updated 2 weeks ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Feb 6, 2023Updated 3 years ago
- Documentation used for Shuffle☆21Updated this week
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆46Jan 2, 2022Updated 4 years ago
- ☆29Aug 19, 2020Updated 5 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆24May 29, 2023Updated 2 years ago
- VelociraptorMCP is a Model Context Protocol bridge for exposing LLMs to MCP clients.☆70Aug 20, 2025Updated 6 months ago
- Modular malware analysis artifact collection and correlation framework☆54Apr 23, 2024Updated last year
- Coding samples using the Kenna Security Platform REST API. All the code samples in this GitHub repository are offered “as is” and include…☆31Jul 15, 2025Updated 7 months ago
- Workflows for Shuffle☆24Oct 26, 2022Updated 3 years ago