SimoneCagol / sigma-rules-crawler
☆31Updated this week
Alternatives and similar repositories for sigma-rules-crawler:
Users that are interested in sigma-rules-crawler are comparing it to the libraries listed below
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆23Updated last year
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆76Updated last year
- Yara Rules for Modern Malware☆73Updated last year
- YARA rule analyzer to improve rule quality and performance☆97Updated 2 months ago
- Placeholder for my detection repo and misc detection engineering content☆42Updated last year
- IOC Collection 2022☆57Updated last year
- ☆30Updated last week
- yara detection rules for hunting with the threathunting-keywords project☆105Updated last month
- Open Dataset of Cobalt Strike Beacon metadata (2018-2022)☆125Updated 2 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated last year
- C2 Active Scanner☆52Updated 8 months ago
- The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the hos…☆30Updated 2 years ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆70Updated 3 months ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Updated 2 years ago
- Python based CLI for MalwareBazaar☆36Updated 4 months ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 2 years ago
- ShellSweeping the evil.☆52Updated 8 months ago
- ☆33Updated last year
- Sigma rules to share with the community☆118Updated last month
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆65Updated 2 years ago
- Library of threat hunts to get any user started!☆42Updated 4 years ago
- Automated detection rule analysis utility☆29Updated 2 years ago
- pySigma Splunk backend☆36Updated last week
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆85Updated 2 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆59Updated 2 years ago
- Simple PowerShell script to enable process scanning with Yara.☆91Updated 2 years ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆75Updated this week
- ☆68Updated last week
- Active C&C Detector☆152Updated last year