SigmaHQ / Detection-Rule-LicenseLinks
Detection Rule License (DRL)
☆18Updated 7 months ago
Alternatives and similar repositories for Detection-Rule-License
Users that are interested in Detection-Rule-License are comparing it to the libraries listed below
Sorting:
- Collection of YARA rules designed for usage through VirusTotal.com.☆76Updated last year
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Updated last year
- Lightweight Python-Based Malware Analysis Pipeline☆34Updated last month
- ☆96Updated 3 months ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆77Updated 2 years ago
- Yet another way to find where to report an abuse☆32Updated 6 months ago
- ☆23Updated 2 years ago
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆69Updated 2 months ago
- Open IOC sharing platform☆60Updated 9 months ago
- ShellSweeping the evil.☆53Updated last year
- ☆66Updated 2 years ago
- An extension of the sigma standard to include security metrics.☆15Updated 2 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆65Updated 3 years ago
- Open YARA scan- and search engine☆24Updated 6 months ago
- Share your Yara rules with VirusTotal☆25Updated last year
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 3 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆11Updated last week
- Threatfox Censys is a tool to query Censys Search for IP addresses and domains and then parses the JSON and submits the results to Threat…☆33Updated this week
- Can you pay the ransom in your country?☆15Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- Fast lookup server for NSRL and other hash database used in digital forensic☆45Updated 3 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated 7 months ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Updated last year
- Reads and prints information from the website MalAPI.io☆19Updated 3 years ago
- THOR APT Scanner User Manual☆18Updated last week
- A web scraper to create MISP events and reports☆16Updated last month
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆65Updated last year
- C2 Active Scanner☆59Updated last year