SEKOIA-IO / Community
Welcome to the SEKOIA.IO Community repository!
☆147Updated this week
Alternatives and similar repositories for Community:
Users that are interested in Community are comparing it to the libraries listed below
- ☆127Updated 2 weeks ago
- yara detection rules for hunting with the threathunting-keywords project☆116Updated last month
- Sigma rules to share with the community☆119Updated 2 months ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆72Updated 4 months ago
- Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.☆167Updated last week
- ☆195Updated last year
- The Threat Actor Profile Guide for CTI Analysts☆106Updated last year
- A repository of my own Sigma detection rules.☆158Updated 7 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆121Updated last year
- Harness the power of Splunk for your investigations☆98Updated 2 weeks ago
- A repository to share publicly available Velociraptor detection content☆154Updated this week
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆84Updated 2 months ago
- ☆68Updated last month
- Rules generated from our investigations.☆194Updated 3 weeks ago
- MISP Playbooks☆194Updated 2 months ago
- An opensource sigma conversion tool built using pysigma☆123Updated 3 months ago
- Automated YARA Rule Standardization and Quality Assurance Tool☆207Updated this week
- ☆31Updated this week
- LotL RMM☆170Updated 3 weeks ago
- ☆199Updated last year
- ☆96Updated 3 months ago
- pySigma Elasticsearch backend☆52Updated last week
- LOKI2 - Simple IOC and YARA Scanner☆89Updated 8 months ago
- IOC Collection 2022☆57Updated 2 years ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆118Updated last year
- The Sigma command line interface based on pySigma☆149Updated this week
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆78Updated last week
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 2 years ago
- CarbonBlack EDR detection rules and response actions☆71Updated 7 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆87Updated 5 months ago