WithSecureLabs / iocs
☆15Updated 11 months ago
Alternatives and similar repositories for iocs:
Users that are interested in iocs are comparing it to the libraries listed below
- Quick ESXi Log Parser☆17Updated 2 months ago
- Cyber Threats Detection Rules☆14Updated 2 months ago
- Hunt for SQLite files used by various applications☆23Updated last week
- my MSTICpy practice and custom tools repository☆11Updated 4 months ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Updated 4 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Updated last month
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆31Updated last month
- ☆33Updated 3 years ago
- ☆21Updated 2 years ago
- ☆20Updated 2 weeks ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated last year
- Just Another broken Registry Parser (JARP)☆16Updated 10 months ago
- Thor Artifacts for Velociraptor☆15Updated 9 months ago
- Security Content for the PEAK Threat Hunting Framework☆28Updated last year
- Contains compiled binaries of Volatility☆33Updated 2 months ago
- Scripts and lists to help generate YARA friendly string mutations☆21Updated last year
- Scripts to for ready-to-use Velociraptor instance deployment in Azure☆13Updated last year
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- ☆15Updated 3 years ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆26Updated 2 years ago
- ☆34Updated 2 years ago
- Jupyter Notebooks for Cyber Threat Intelligence☆36Updated last year
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆58Updated 2 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆13Updated 3 years ago
- ShellSweeping the evil.☆52Updated 9 months ago
- ☆14Updated 2 years ago
- VTC - Velociraptor Timeline Creator☆15Updated 10 months ago
- A web scraper to create MISP events and reports☆14Updated 2 years ago