SCS-Labs / TheWatchList
Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.
☆16Updated 3 years ago
Alternatives and similar repositories for TheWatchList:
Users that are interested in TheWatchList are comparing it to the libraries listed below
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 4 months ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Log4Shell IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆18Updated 2 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆20Updated 2 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- Parser for Windows PowerShell script block logs☆13Updated 3 months ago
- ☆15Updated 3 years ago
- This repository contains generated contextual data utilized by pyattck.☆19Updated last month
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆22Updated last year
- ☆12Updated 3 years ago
- Threat Mitigation Strategies☆25Updated last year
- Automatic detection engineering technical state compliance☆55Updated 8 months ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Updated 4 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 5 months ago
- Kibana app for RedELK☆16Updated 2 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- Links to malware-related YARA rules☆15Updated 2 years ago
- Triaging Windows event logs based on SANS Poster☆39Updated 2 years ago
- Some portable tools, some YARA, some Python, and a little bit of love. Not all of these tools can be used in incident response. Use PEs…☆34Updated last year
- A quick reference guide for python script development in DFIR☆16Updated last year
- Speaking materials from conferences I've given☆9Updated 2 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 2 months ago
- An extension of the sigma standard to include security metrics.☆15Updated last year
- ☆34Updated 2 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated last year
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆23Updated 2 years ago