PaloAltoNetworks / Unit42-Threat-Intelligence-Article-Information
This is the repository for indicators of compromise (IOCs) and other data for threat intelligence articles posted on the Palo Alto Networks Unit 42 website.
☆13Updated last week
Related projects ⓘ
Alternatives and complementary repositories for Unit42-Threat-Intelligence-Article-Information
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆76Updated last week
- CarbonBlack EDR detection rules and response actions☆71Updated 2 months ago
- Tools and scripts to deploy and manage OpenRelik instances☆10Updated 3 weeks ago
- ☆19Updated last year
- Remote access and Antivirus Logging Database☆41Updated 6 months ago
- Sigma detection rules for hunting with the threathunting-keywords project☆47Updated 3 weeks ago
- Contains compiled binaries of Volatility☆29Updated last month
- Memory Baseliner is a script that can compare two windows memory images or perform frequency of occurrence / data stacking analysis on mu…☆49Updated last year
- Parses USB connection artifacts from offline Registry hives☆74Updated this week
- The ultimate solution for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆22Updated 3 months ago
- ☆48Updated last year
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆59Updated 3 weeks ago
- User Feedback Space of #MitreAssistant☆37Updated last year
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆52Updated last month
- Repository where I hold random detection and threat hunting queries that I come up with based on different sources of information (or eve…☆38Updated 2 weeks ago
- USN Journal full path builder☆36Updated 2 months ago
- A collection of various SIEM rules relating to malware family groups.☆62Updated 5 months ago
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆23Updated this week
- ☆26Updated this week
- Harness the power of Splunk for your investigations☆77Updated this week
- Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)☆67Updated last year
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆68Updated last year
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆28Updated this week
- A repository to share publicly available Velociraptor detection content☆119Updated this week
- Config files for my GitHub profile.☆14Updated last year
- BlackBerry Threat Research & Intelligence☆93Updated last year
- Logbook for Digital Forensics and Incident Response☆49Updated 4 months ago
- Linux Baseline and Forensic Triage Tool - BETA☆50Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆49Updated 6 months ago
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆40Updated this week