WeaverHeavy / CTIALinks
Cyber Threat Intelligence Appliance
☆13Updated 2 years ago
Alternatives and similar repositories for CTIA
Users that are interested in CTIA are comparing it to the libraries listed below
Sorting:
- Automatic detection engineering technical state compliance☆55Updated 11 months ago
- Library of threat hunts to get any user started!☆44Updated 4 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Updated 4 years ago
- Python based CLI for MalwareBazaar☆37Updated 7 months ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 3 years ago
- ☆42Updated last year
- A repository of Sysmon For Linux configuration modules☆15Updated 3 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Updated 4 years ago
- ShellSweeping the evil.☆53Updated last year
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- Command-line tool to search for malware samples in various repositories☆11Updated 3 years ago
- Scripts and lists to help generate YARA friendly string mutations☆21Updated 2 years ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆38Updated last year
- Yara Based Detection Engine for web browsers☆49Updated 3 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- yara detection rules for hunting with the threathunting-keywords project☆122Updated last month
- Tools and Binaries to use with KAPE☆12Updated 5 years ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆64Updated 2 years ago
- Placeholder for my detection repo and misc detection engineering content☆42Updated last year
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆27Updated 11 months ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- A home for detection content developed by the delivr.to team☆69Updated 3 weeks ago
- Sharing Threat Hunting runbooks☆26Updated 5 years ago
- Simple PowerShell script to enable process scanning with Yara.☆94Updated 2 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆73Updated 3 years ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆79Updated last month
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆34Updated 2 months ago
- A project that aims to automate Volatility3 at scale with the use of cloud strength and the power of KQL inside ADX.☆16Updated 6 months ago
- YARA rule analyzer to improve rule quality and performance☆102Updated 2 months ago