SigmaHQ / Detection-Rule-LicenseLinks
Detection Rule License (DRL)
☆17Updated 6 months ago
Alternatives and similar repositories for Detection-Rule-License
Users that are interested in Detection-Rule-License are comparing it to the libraries listed below
Sorting:
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆67Updated last month
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Updated last year
- ShellSweeping the evil.☆53Updated last year
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆77Updated last year
- Open IOC sharing platform☆55Updated 8 months ago
- Resources and Discussions About Detection Engineering☆12Updated 2 years ago
- Provides a multi-platform Graphical User Interface for hashlookup☆12Updated last year
- An extension of the sigma standard to include security metrics.☆15Updated 2 years ago
- Can you pay the ransom in your country?☆14Updated last year
- Collection of YARA rules designed for usage through VirusTotal.com.☆74Updated last year
- Share your Yara rules with VirusTotal☆25Updated 11 months ago
- Indicators of Normality☆11Updated 2 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated 2 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- Fast lookup server for NSRL and other hash database used in digital forensic☆45Updated 3 years ago
- ☆23Updated 2 years ago
- Log4Shell IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆18Updated 2 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆64Updated 2 years ago
- THOR APT Scanner User Manual☆18Updated this week
- Lightweight Python-Based Malware Analysis Pipeline☆34Updated 2 weeks ago
- ☆66Updated 2 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated 5 months ago
- ☆43Updated last year
- Collection of generic YARA rules☆16Updated last year
- Setting up a training environment for MISP☆12Updated 2 years ago
- PowerShell script that abuses browser bookmark synchronization as a mechanism for sending and receiving data between systems.☆16Updated 2 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- Open-source Fabric templates for cybersecurity and compliance☆21Updated 5 months ago
- Open YARA scan- and search engine☆24Updated 4 months ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆18Updated 3 years ago