PaloAltoNetworks / Unit42-Threat-Intelligence-Article-Information
This is the repository for indicators of compromise (IOCs) and other data for threat intelligence articles posted on the Palo Alto Networks Unit 42 website.
☆20Updated last month
Alternatives and similar repositories for Unit42-Threat-Intelligence-Article-Information:
Users that are interested in Unit42-Threat-Intelligence-Article-Information are comparing it to the libraries listed below
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆50Updated last month
- Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)☆68Updated last year
- Remote access and Antivirus Logging Database☆43Updated 8 months ago
- Contains compiled binaries of Volatility☆30Updated 3 months ago
- Detection rule validation☆41Updated last year
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆82Updated 2 months ago
- ☆20Updated last year
- ESXi Cyber Security Incident Response Script☆22Updated 4 months ago
- Tools and scripts to deploy and manage OpenRelik instances☆11Updated last month
- This repository contains supplemental items including IOCs, and signatures discussed in Huntress blogposts, and other media.☆33Updated last month
- This repository contains sample log data that were collected after running adversary simulations in Microsoft 365☆20Updated 3 months ago
- ☆19Updated last year
- The ultimate solution for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆22Updated 4 months ago
- MS Graph Commands and Tools for Blue Teamers☆49Updated last year
- Logbook for Digital Forensics and Incident Response☆50Updated 6 months ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆19Updated this week
- ☆34Updated 3 weeks ago
- CarbonBlack EDR detection rules and response actions☆71Updated 4 months ago
- Memory Baseliner is a script that can compare two windows memory images or perform frequency of occurrence / data stacking analysis on mu…☆50Updated last year
- This repository is created to store the artifacts for any intrusions I share publicly.☆24Updated last year
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆30Updated last month
- Baseline a Windows System against LOLBAS☆25Updated 8 months ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆73Updated last year
- USN Journal full path builder☆52Updated 4 months ago
- RegRipper4.0☆41Updated last year
- A repo hosting the Markua content for the EZ Tools manuals hosted on Leanpub☆64Updated last year
- Sigma detection rules for hunting with the threathunting-keywords project☆51Updated last month
- Repo that hold write-ups of various research projects I did and/or overall InfoSec things I investigated/researched.☆17Updated 2 weeks ago
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆26Updated 2 years ago
- Parses USB connection artifacts from offline Registry hives☆93Updated last month