SEKOIA-IO / CommunityLinks
Welcome to the SEKOIA.IO Community repository!
☆163Updated 2 weeks ago
Alternatives and similar repositories for Community
Users that are interested in Community are comparing it to the libraries listed below
Sorting:
- ☆141Updated last week
- yara detection rules for hunting with the threathunting-keywords project☆126Updated 2 months ago
- Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.☆187Updated this week
- Sigma rules to share with the community☆121Updated 6 months ago
- ☆69Updated 5 months ago
- Automated YARA Rule Standardization and Quality Assurance Tool☆231Updated last week
- ☆197Updated last year
- Indicators of Compromise☆211Updated last week
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆73Updated last week
- pySigma Elasticsearch backend☆54Updated this week
- A repository of my own Sigma detection rules.☆160Updated 10 months ago
- The Threat Actor Profile Guide for CTI Analysts☆110Updated 2 years ago
- Harness the power of Splunk for your investigations☆117Updated last month
- MISP Playbooks☆205Updated last month
- Rules generated from our investigations.☆196Updated last month
- An opensource sigma conversion tool built using pysigma☆132Updated last month
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆155Updated 5 months ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆164Updated last year
- ☆93Updated 2 months ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆84Updated 2 months ago
- ☆38Updated 3 weeks ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆154Updated 3 months ago
- Threat Hunting queries for various attacks☆238Updated this week
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆67Updated last year
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Updated 10 months ago
- Sigma rule specification☆140Updated this week
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆124Updated last year
- Powershell module for VMWare vSphere forensics☆153Updated 8 months ago
- 🏴☠️💰 Another Ransomware gang tracker☆228Updated this week
- Sample evtx files to use for testing hayabusa detection rules☆58Updated 8 months ago