SCS-Labs / TheWatchList
Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.
☆16Updated 3 years ago
Alternatives and similar repositories for TheWatchList:
Users that are interested in TheWatchList are comparing it to the libraries listed below
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 3 years ago
- Threat Mitigation Strategies☆25Updated last year
- Automatic detection engineering technical state compliance☆54Updated 7 months ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 3 months ago
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23Updated 2 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 4 months ago
- Kibana app for RedELK☆16Updated last year
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆22Updated last year
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Updated 4 years ago
- ☆12Updated 3 years ago
- ☆41Updated 11 months ago
- Epimitheus is a tool that uses graphical database Neo4j for Windows Events visualization.☆18Updated 2 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 3 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Updated 3 years ago
- Splunk Technology-AddOn for Aurora Sigma-Based EDR Agent. It helps parse and configure the necessary inputs to neatly consume Aurora EDR …☆13Updated 2 years ago
- ☆11Updated 4 years ago
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆20Updated 2 years ago
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆15Updated 2 years ago
- This repository contains generated contextual data utilized by pyattck.☆19Updated 7 months ago
- Threat Detection Rules (Snort/Sigma/Yara)☆13Updated last year
- A dataset of phishing kits in the wild☆15Updated 9 months ago
- Links to malware-related YARA rules☆14Updated 2 years ago
- Automated Static Analysis Framework☆9Updated 3 years ago
- ProcDot Malware Sandbox☆22Updated 3 months ago