SCILabsMX / yaraZeekAlertLinks
This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a match it sends email alerts to the email address specified in the mailTo parameter on yaraAlert.conf file. The alert includes network context of the file transfer and attaches the suspicious file if it is less tha…
☆62Updated last year
Alternatives and similar repositories for yaraZeekAlert
Users that are interested in yaraZeekAlert are comparing it to the libraries listed below
Sorting:
- Repository containing IOCs, CSV and MISP JSON from our blogs☆81Updated 4 years ago
- Import specific data sources into the Sigma generic and open signature format.☆78Updated 3 years ago
- Automatically create YARA rules from malicious documents.☆212Updated 3 years ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆87Updated 2 years ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆78Updated 3 years ago
- A lightweight tool to load Windows Event Log evtx files into Elasticsearch.☆119Updated 4 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆102Updated 2 months ago
- ☆116Updated last year
- Random hunting ordiented yara rules☆97Updated 2 years ago
- SEC599 supporting GitHub repository☆16Updated 5 years ago
- Threat Alert Logic Repository☆92Updated 6 years ago
- Sigma Detection Rule Repository☆89Updated 5 years ago
- A website and framework for testing NIDS detection☆57Updated 4 years ago
- Dovehawk is a Zeek module that automatically imports MISP indicators and reports Sightings☆121Updated 4 years ago
- ☆77Updated 5 years ago
- Log Entry to Sigma Rule Converter☆109Updated 3 years ago
- Cloud Templates and scripts to deploy mordor environments☆129Updated 4 years ago
- Mindmaps for threat hunting - work in progress.☆151Updated 3 years ago
- A YARA Rule Performance Measurement Tool☆60Updated last year
- Primary data pipelines for intrusion detection, security analytics and threat hunting☆87Updated 3 years ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆106Updated 3 months ago
- Collection of useful, up to date, Carbon Black Response Queries☆84Updated 4 years ago
- A Splunk app to use MISP in background☆111Updated last month
- Mapping NSM rules to MITRE ATT&CK☆71Updated 5 years ago
- A community event for security researchers to share their favorite notebooks☆108Updated last year
- Proofpoint - Emerging Threats - Threat Research tools + publicly shared intel and documentation☆77Updated 2 months ago
- FRAC and RIFT☆17Updated 6 years ago
- Research indicators and detection rules☆66Updated last year
- Simple yara rule manager☆66Updated 2 years ago
- Collection of YARA signatures from individual research☆44Updated last year