abzcoding / aptdetectorLinks
Advanced Persistent Threat Detection Using Network Analysis
☆22Updated 6 years ago
Alternatives and similar repositories for aptdetector
Users that are interested in aptdetector are comparing it to the libraries listed below
Sorting:
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Updated 8 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Updated 3 months ago
- A web-based tool to assist the work of the intuitive threat analysts.☆112Updated 6 years ago
- The Fastest way to consume Threat Intel☆26Updated 3 years ago
- CARET - A tool for viewing cyber analytic relationships☆55Updated 5 years ago
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆44Updated 4 years ago
- A map displaying threat actors from the misp-galaxy☆33Updated 2 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- brostash: Linux distribution based on Debian and focusing on network security events collection☆34Updated 5 years ago
- ☆35Updated 4 years ago
- Python scripts to download, parse, and enrich scans.io study data and load into Splunk for research, threat intelligence gathering, and s…☆19Updated 2 months ago
- Malware/IOC ingestion and processing engine☆107Updated 6 years ago
- Providing timelines based on OSINT Reports☆32Updated 2 years ago
- Home to the ActorTrackr source code☆29Updated 8 years ago
- HoneyDB Python Module☆14Updated last year
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆37Updated 3 years ago
- Combining OSINT sources in Elastic Stack☆80Updated 5 years ago
- Hunting IOCs all day every day...☆86Updated 2 years ago
- intelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; inclu…☆41Updated 6 years ago
- Repository of yara rules☆60Updated 2 years ago
- Proof of concept implementation of a cyber threat intelligence and incident handling platform☆11Updated 2 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆64Updated 6 years ago
- Semi-Intelligent HoneyPot Network - Semi-Intelligent Reactive Environment Network☆14Updated 7 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- How to Zeek Sysmon Logs!☆102Updated 3 years ago
- Yara rules to be used with the Burp Yara-Scanner extension☆49Updated 3 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 8 years ago
- Amun Honeypot☆63Updated last year
- ☆18Updated 7 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago