advanced-threat-research / Ripple-20-Detection-LogicLinks
Ripple20 Critical Vulnerabilities - Detection Logic and Signatures
☆12Updated 4 years ago
Alternatives and similar repositories for Ripple-20-Detection-Logic
Users that are interested in Ripple-20-Detection-Logic are comparing it to the libraries listed below
Sorting:
- Analytics for Accounting logs from Network devices☆17Updated 4 years ago
- Old home of LimaCharlie, open source EDR☆31Updated last year
- Bro integration with osquery☆15Updated 2 years ago
- ☆12Updated 3 years ago
- ☆43Updated 2 years ago
- Threat Mapping Catalogue☆17Updated 3 years ago
- How to Zeek Sysmon Logs!☆102Updated 3 years ago
- Look into EDR events from network☆23Updated last month
- Suricata rule and intel index☆31Updated 3 months ago
- ☆41Updated 2 years ago
- Collection of Suricata rule sets that I use modified to my environments.☆39Updated 4 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 5 years ago
- A Yara Lua output script for Suricata☆20Updated 6 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- Automated detection rule analysis utility☆29Updated 2 years ago
- ☆13Updated 5 years ago
- ☆34Updated 4 years ago
- go-atomicredteam is a Golang application to execute tests as defined in the atomics folder of Red Canary's Atomic Red Team project (https…☆49Updated 2 years ago
- Elasticsearch/Kibana environment and log data for Sigma workshop☆27Updated 5 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Automatic detection engineering technical state compliance☆55Updated 11 months ago
- Windows GUI/Execution Engine for Atomic Red Team Atomics☆35Updated 5 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Updated 10 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 5 years ago
- Simulating Adversary Operations☆93Updated 7 years ago
- Generic Signature Format for SIEM Systems☆17Updated last year
- The Fastest way to consume Threat Intel☆25Updated 3 years ago
- Cybersecurity Incidents Mind Maps☆33Updated 3 years ago