SimoneCagol / sigma-rules-crawler
☆29Updated this week
Related projects ⓘ
Alternatives and complementary repositories for sigma-rules-crawler
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 2 years ago
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆72Updated 2 weeks ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆20Updated last year
- Automated detection rule analysis utility☆29Updated 2 years ago
- Automatic detection engineering technical state compliance☆50Updated 4 months ago
- Threat Detection Rules (Snort/Sigma/Yara)☆13Updated 9 months ago
- Library of threat hunts to get any user started!☆40Updated 4 years ago
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆35Updated 3 weeks ago
- Yara Based Detection Engine for web browsers☆47Updated 3 years ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆52Updated 3 months ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 3 years ago
- Links to malware-related YARA rules☆14Updated 2 years ago
- ☆41Updated 7 months ago
- Look into EDR events from network☆23Updated 7 months ago
- Tracking APT IOCs☆25Updated 4 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆74Updated last month
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆56Updated last year
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆81Updated 2 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆104Updated 2 years ago
- Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert☆37Updated 2 years ago
- YARA rule analyzer to improve rule quality and performance☆93Updated 11 months ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆50Updated 2 years ago
- ☆61Updated last month
- Open IOC sharing platform☆53Updated last week
- ☆15Updated 2 years ago
- Custom Splunk search command to reconstruct a pstree from Sysmon process creation events (EventCode 1)☆23Updated last year
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Updated 2 years ago
- This repository hosts community contributed Kestrel huntflows (.hf) and huntbooks (.ipynb)☆31Updated 10 months ago
- A home for detection content developed by the delivr.to team☆59Updated last week