SentineLabs / macos-ttps-yaraLinks
A ruleset to find potentially malicious code in macOS malware samples
☆41Updated 2 years ago
Alternatives and similar repositories for macos-ttps-yara
Users that are interested in macos-ttps-yara are comparing it to the libraries listed below
Sorting:
- Repository that contains a set of purposefully erroneous Yara rules.☆61Updated 5 months ago
- Rules shared by the community from 100 Days of YARA 2025☆38Updated 2 weeks ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated last year
- ForgeArmory provides TTPs that can be used with the TTPForge (https://github.com/facebookincubator/ttpforge).☆119Updated 3 weeks ago
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆30Updated 7 months ago
- macOS forensic timeline generator using the analysis result DBs of mac_apt☆92Updated 2 years ago
- ☆169Updated 3 months ago
- Examine Chrome extensions for security issues☆92Updated 2 months ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆38Updated last year
- God Mode Detection Rules☆135Updated last year
- Memory Forensic System on Cloud☆92Updated 2 years ago
- HASH (HTTP Agnostic Software Honeypot)☆141Updated last year
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- pocket guide for core detection engineering concepts☆31Updated 2 years ago
- ☆51Updated last month
- ☆41Updated last year
- acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.☆115Updated this week
- ☆101Updated last month
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆53Updated last year
- Detection Engineering with YARA☆86Updated 2 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆41Updated 8 months ago
- C2 Active Scanner☆59Updated last year
- ☆18Updated 2 weeks ago
- Convert Sigma rules to SIEM queries, directly in your browser.☆107Updated last month
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Updated last year
- An index of publicly available and open-source threat detection rulesets.☆130Updated 9 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆83Updated last month
- ☆136Updated 5 months ago
- A home for detection content developed by the delivr.to team☆73Updated 5 months ago