PSJoshi / Notes
My notes on various topics
☆64Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Notes
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆57Updated 4 years ago
- Elasticsearch/Kibana environment and log data for Sigma workshop☆26Updated 4 years ago
- ☆50Updated 6 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆36Updated 3 months ago
- ☆43Updated 7 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Updated 7 years ago
- A CALDERA plugin for ATT&CK Evaluations Round 1☆33Updated last year
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 4 years ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆76Updated 2 years ago
- ☆27Updated 6 years ago
- A YARA Rule Performance Measurement Tool☆58Updated 8 months ago
- The Fastest way to consume Threat Intel☆25Updated 2 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆60Updated 10 months ago
- Sandbox feature upgrade with the help of wrapped samples☆75Updated 6 years ago
- Community-based integrated malware identification system☆82Updated last year
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆64Updated 6 months ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆255Updated 5 years ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆84Updated last year
- SilkETW & SilkService☆40Updated 5 years ago
- A collection of infosec related scripts and information.☆53Updated last month
- Repository for my ATT&CK analysis research.☆68Updated 5 years ago
- Website crawler with YARA detection☆88Updated last year
- Real Time Threat Monitoring Tool☆112Updated last year
- Repository containing IOCs, CSV and MISP JSON from our blogs☆79Updated 3 years ago
- A collection of resources for security data☆40Updated 6 years ago
- ☆14Updated 6 years ago
- Place for resources used during the Mordor Detection hackathon event featuring APT29 ATT&CK evals datasets☆132Updated 4 years ago
- ☆52Updated 5 years ago
- Detecting Lateral Movement with Machine Learning☆137Updated 7 years ago