☆31Nov 30, 2016Updated 9 years ago
Alternatives and similar repositories for SmartThingsPublic
Users that are interested in SmartThingsPublic are comparing it to the libraries listed below
Sorting:
- Provides a multi-platform Graphical User Interface for hashlookup☆12Jul 12, 2024Updated last year
- Indicators of compromise from to analysis and research by Nextron Threat Research team☆12Sep 17, 2025Updated 5 months ago
- ☆10Dec 24, 2022Updated 3 years ago
- CQL Hub is an open repository of detection and hunting queries for CrowdStrike NextGen SIEM and Falcon LogScale. All queries stored here …☆40Updated this week
- Synapse Rapid Power-up for SinkDB☆11Jun 24, 2025Updated 8 months ago
- sKaleQL is an opinionated template repository for managing, executing, and organizing Kusto Query Language (KQL) queries against Azure Lo…☆19May 20, 2025Updated 9 months ago
- Open source HIDS tailored for Microsoft Windows and Active Directory☆29Feb 13, 2026Updated 2 weeks ago
- a-ray-grass is a yara module that provides support for DCSO-format bloom filters in yara. In the context of hashlookup, it allows quickly…☆14Aug 19, 2022Updated 3 years ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- Repository with Hunting and Detection Queries for Microsoft Sentinel and Microsoft Defender XDR☆16Nov 7, 2025Updated 3 months ago
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- Everything related to YARA☆16Feb 19, 2026Updated 2 weeks ago
- Threat Detection Rules (Snort/Sigma/Yara)☆14Jan 23, 2024Updated 2 years ago
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Aug 2, 2020Updated 5 years ago
- An introduction to detection engineering☆14Jan 3, 2025Updated last year
- ☆14Aug 21, 2022Updated 3 years ago
- Links to malware-related YARA rules☆15Sep 29, 2022Updated 3 years ago
- FireEye iSIGHT Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆16Oct 12, 2018Updated 7 years ago
- Adversary Simulation Framework☆38Aug 19, 2025Updated 6 months ago
- ☆19Jul 21, 2022Updated 3 years ago
- pan-stix☆19Oct 12, 2017Updated 8 years ago
- Generation of STIX2 compliant entities for Maltego☆20Oct 4, 2023Updated 2 years ago
- Visualize Microsoft Defender XDR process trees and security events☆33Aug 24, 2025Updated 6 months ago
- Synchronizes posts from Mastodon to Bluesky and back☆20Oct 5, 2025Updated 5 months ago
- ☆18Mar 26, 2024Updated last year
- ☆15Nov 25, 2021Updated 4 years ago
- Collection of my own detection rules☆20Jan 6, 2026Updated last month
- Log4j Exploit Detection Logic for Zeek☆19Nov 25, 2025Updated 3 months ago
- GenAI-STIX2.1-Generator is a tool that leverages Azure OpenAI capabilities to transform threat intelligence reports from unstructured web…☆24Mar 24, 2025Updated 11 months ago
- A curated collection of Living off the Land (LotL) attack demonstrations where trusted binaries go rogue, because if it didn’t launch cal…☆35Jan 7, 2026Updated last month
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆17May 18, 2021Updated 4 years ago
- Extracting and analyzing URLs from Emails for phishing events☆21Oct 22, 2020Updated 5 years ago
- Detect Phishing with Bro IDS☆18Feb 1, 2017Updated 9 years ago
- ☆25Jul 23, 2024Updated last year
- ☆22Dec 22, 2020Updated 5 years ago
- ☆23Dec 15, 2022Updated 3 years ago
- ☆19Oct 23, 2020Updated 5 years ago
- ☆23Jul 7, 2023Updated 2 years ago