WeaverHeavy / Threat-Intelligence-Tradecraft
☆27Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for Threat-Intelligence-Tradecraft
- Repository for my ATT&CK analysis research.☆68Updated 5 years ago
- Generate ATT&CK Navigator layer file from PowerShell Empire agent logs☆49Updated 6 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 6 years ago
- Historical Observations of Actionable Reputation Data☆13Updated 6 years ago
- An Incident Response tool that visualizes historic process execution evidence (based on Event ID 4688 - Process Creation Event) in a tree…☆59Updated 6 years ago
- Sandbox feature upgrade with the help of wrapped samples☆75Updated 6 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Updated 5 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆15Updated 3 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 6 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 5 years ago
- Bro PCAP Processing and Tagging API☆28Updated 7 years ago
- Some rules, scripts of some use to us☆9Updated 3 weeks ago
- Mitre Att&ck Technique Emulation☆82Updated 5 years ago
- SilkETW & SilkService☆40Updated 5 years ago
- Python scripts to parse scans.io ssl data and ingest into elasticsearch for searching☆33Updated 8 years ago
- A collection of infosec related scripts and information.☆53Updated last month
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Updated 7 years ago
- Links to malware-related YARA rules☆14Updated 2 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Updated 5 years ago
- Presentation materials for talks I've given.☆20Updated 5 years ago
- The new name is DeTT&CT☆24Updated 5 years ago
- Yara rules to be used with the Burp Yara-Scanner extension☆44Updated 2 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆17Updated 5 years ago
- Generate bulk YARA rules from YAML input☆22Updated 4 years ago
- Theat hunting notes in flat file format and mapped to MITRE's ATT&CK IDs☆42Updated 6 years ago
- ☆14Updated 6 years ago
- Detect kerberos attacks in pcap files☆27Updated 8 years ago