SigmaHQ / Detection-Rule-License
Detection Rule License (DRL)
β16Updated last month
Alternatives and similar repositories for Detection-Rule-License:
Users that are interested in Detection-Rule-License are comparing it to the libraries listed below
- Indicators of Normalityβ12Updated 2 years ago
- π§ Currently transfering TLP:CLEAR rules from TLP:AMBER repository...β22Updated 10 months ago
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligenceβ¦β56Updated 2 months ago
- Share your Yara rules with VirusTotalβ24Updated 6 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data wβ¦β51Updated 2 months ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.β22Updated last year
- Open YARA scan- and search engineβ19Updated 2 months ago
- Log4Shell IOCs from CERT Orange Cyberdefense Threat Intelligence Datalakeβ18Updated 2 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.β75Updated last year
- ShellSweeping the evil.β52Updated 8 months ago
- Parser for Windows PowerShell script block logsβ13Updated last month
- Can you pay the ransom in your country?β13Updated last year
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.β26Updated 3 months ago
- Fast lookup server for NSRL and other hash database used in digital forensicβ43Updated 2 years ago
- Windows Security Loggingβ43Updated 2 years ago
- β28Updated last month
- An extension of the sigma standard to include security metrics.β15Updated last year
- Collection of generic YARA rulesβ15Updated 8 months ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.β27Updated last year
- Indicators of compromise from to analysis and research by Nextron Threat Research teamβ10Updated 4 months ago
- Reads and prints information from the website MalAPI.ioβ19Updated 2 years ago
- Defeating Anti-Debugging Techniques for Malware Analysisβ13Updated 2 years ago
- PowerShell script that abuses browser bookmark synchronization as a mechanism for sending and receiving data between systems.β15Updated 2 years ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users inβ¦β22Updated last week
- Collection of videos of Raids on Cybercriminalsβ18Updated 4 months ago
- A web scraper to create MISP events and reportsβ14Updated 2 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testingβ21Updated last year
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalogβ18Updated last year
- β22Updated 2 years ago