SigmaHQ / Detection-Rule-LicenseLinks
Detection Rule License (DRL)
β21Updated 11 months ago
Alternatives and similar repositories for Detection-Rule-License
Users that are interested in Detection-Rule-License are comparing it to the libraries listed below
Sorting:
- Open IOC sharing platformβ63Updated last year
- π§ Currently transfering TLP:CLEAR rules from TLP:AMBER repository...β21Updated last year
- Collection of YARA rules designed for usage through VirusTotal.com.β79Updated last year
- β96Updated 7 months ago
- Can you pay the ransom in your country?β14Updated last year
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligenceβ¦β73Updated 6 months ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.β79Updated 2 years ago
- β23Updated 2 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agenciesβ87Updated 3 years ago
- Share your Yara rules with VirusTotalβ26Updated last year
- Reads and prints information from the website MalAPI.ioβ19Updated 3 years ago
- β67Updated 2 years ago
- A web scraper to create MISP events and reportsβ17Updated 5 months ago
- YaraScanner is a file pattern-matching tool based on YARA rules.β59Updated 2 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.β18Updated 2 years ago
- Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.β29Updated last year
- Open YARA scan- and search engineβ25Updated 9 months ago
- This repository includes a mapping table and a reference process that allows converting between STIX 2.1 Course of Action objects that maβ¦β16Updated 3 years ago
- Repository with selected IOCs and YARA rules for threat hunting.β35Updated 6 months ago
- Fast lookup server for NSRL and other hash database used in digital forensicβ48Updated 3 years ago
- ShellSweeping the evil.β53Updated last year
- β44Updated last week
- An extension of the sigma standard to include security metrics.β15Updated 2 years ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISPβ35Updated 2 years ago
- Yet another way to find where to report an abuseβ30Updated 10 months ago
- Modular malware analysis artifact collection and correlation frameworkβ53Updated last year
- General Contentβ25Updated 3 weeks ago
- Hunt for SQLite files used by various applicationsβ27Updated last month
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reportsβ75Updated 4 months ago
- Hatching Triage public command-line utility and API library.β74Updated 2 years ago