SigmaHQ / Detection-Rule-LicenseLinks
Detection Rule License (DRL)
β21Updated last year
Alternatives and similar repositories for Detection-Rule-License
Users that are interested in Detection-Rule-License are comparing it to the libraries listed below
Sorting:
- π§ Currently transfering TLP:CLEAR rules from TLP:AMBER repository...β21Updated last year
- Open IOC sharing platformβ65Updated 2 weeks ago
- Collection of YARA rules designed for usage through VirusTotal.com.β83Updated last year
- Open YARA scan- and search engineβ25Updated 10 months ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.β79Updated 2 years ago
- Share your Yara rules with VirusTotalβ26Updated last year
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligenceβ¦β75Updated last month
- Can you pay the ransom in your country?β14Updated 2 years ago
- β96Updated 8 months ago
- β23Updated 2 years ago
- ShellSweeping the evil.β53Updated last year
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Editionβ66Updated 3 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of textβ58Updated 3 months ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.β23Updated last year
- Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.β29Updated last year
- MasterParser is a simple, all-in-one, digital forensics artifact parserβ23Updated 4 years ago
- β35Updated 4 years ago
- Yet another way to find where to report an abuseβ30Updated 11 months ago
- A web scraper to create MISP events and reportsβ17Updated 6 months ago
- β67Updated 2 years ago
- Lightweight Python-Based Malware Analysis Pipelineβ37Updated last month
- β46Updated 2 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosureβ40Updated 11 months ago
- Further investigation in to APT campaigns disclosed by private security firms and security agenciesβ87Updated 3 years ago
- Fast lookup server for NSRL and other hash database used in digital forensicβ48Updated 3 years ago
- Hunt for SQLite files used by various applicationsβ27Updated this week
- An extension of the sigma standard to include security metrics.β15Updated 2 years ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reportsβ76Updated last month
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.β25Updated this week
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.β19Updated 2 years ago