WeaverHeavy / Threat-Intelligence-TradecraftLinks
☆27Updated 7 years ago
Alternatives and similar repositories for Threat-Intelligence-Tradecraft
Users that are interested in Threat-Intelligence-Tradecraft are comparing it to the libraries listed below
Sorting:
- Sysmon config for both Windows and Linux Devices. Windows one is a bit dated☆56Updated last year
- A repo to hold some scripts pertaining WMI (Windows implementation of WBEM) forensics☆87Updated 8 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 7 years ago
- An Incident Response tool that visualizes historic process execution evidence (based on Event ID 4688 - Process Creation Event) in a tree…☆60Updated 7 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 7 years ago
- Historical Observations of Actionable Reputation Data☆13Updated 7 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Updated 5 years ago
- Understanding ATT&CK Matrix for Enterprise☆80Updated 7 years ago
- Repository for my ATT&CK analysis research.☆69Updated 6 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- Generate bulk YARA rules from YAML input☆22Updated 5 years ago
- Python scripts to parse scans.io ssl data and ingest into elasticsearch for searching☆33Updated 9 years ago
- A collection of infosec related scripts and information.☆53Updated last year
- Simple DDE object detector☆56Updated 7 years ago
- Generate ATT&CK Navigator layer file from PowerShell Empire agent logs☆48Updated 7 years ago
- Repository of yara rules☆60Updated 2 years ago
- JoeSandbox-Bro is a simple bro script which extracts files from your internet connection and analyzes them automatically on Joe Sandbox☆45Updated 6 years ago
- Detect kerberos attacks in pcap files☆29Updated 9 years ago
- IoC's, PCRE's, YARA's etc☆24Updated 7 months ago
- Python abstract API for PassiveTotal services in the form of libraries and command line utilities.☆85Updated 2 years ago
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 6 years ago
- Credential Phish Analysis and Automation☆97Updated 7 years ago
- ☆52Updated 7 years ago
- Process HTTP Pcaps With YARA☆106Updated 12 years ago
- Validates yara rules and tries to repair the broken ones.☆40Updated 5 years ago
- Various config files obtained during malware analysis☆67Updated 7 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 7 years ago
- Community-based integrated malware identification system☆82Updated 2 years ago
- Handy scripts to speed up malware analysis☆35Updated 2 years ago
- All materials from our Black Hat 2018 "Subverting Sysmon" talk☆135Updated 7 years ago