SigmaHQ / Detection-Rule-License
Detection Rule License (DRL)
☆17Updated 2 months ago
Alternatives and similar repositories for Detection-Rule-License:
Users that are interested in Detection-Rule-License are comparing it to the libraries listed below
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆76Updated last year
- Hunt for SQLite files used by various applications☆22Updated 3 weeks ago
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆57Updated this week
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆22Updated last year
- Share your Yara rules with VirusTotal☆24Updated 7 months ago
- Log4Shell IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆18Updated 2 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- ShellSweeping the evil.☆52Updated 9 months ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- Open YARA scan- and search engine☆22Updated last month
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated 8 months ago
- Collection of generic YARA rules☆15Updated 9 months ago
- An extension of the sigma standard to include security metrics.☆15Updated last year
- Indicators of Normality☆12Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 3 months ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Updated last year
- Parser for Windows PowerShell script block logs☆13Updated 2 months ago
- This repository contains generated contextual data utilized by pyattck.☆19Updated 2 weeks ago
- Azure Deployment Templates for Mandiant Managed Huning☆11Updated last year
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 3 years ago
- ☆22Updated 10 months ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated last year
- Open IOC sharing platform☆56Updated 4 months ago
- Detection rule validation☆41Updated last year
- Contains compiled binaries of Volatility☆33Updated 2 months ago
- Collection of videos of Raids on Cybercriminals☆19Updated this week
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆26Updated 2 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- External telegram feeder for AIL framework☆13Updated last month
- ☆28Updated 2 months ago