ail-project / ail-yara-rulesLinks
A set of YARA rules for the AIL framework to detect leak or information disclosure
☆38Updated 4 months ago
Alternatives and similar repositories for ail-yara-rules
Users that are interested in ail-yara-rules are comparing it to the libraries listed below
Sorting:
- Cybersecurity Incidents Mind Maps☆33Updated 3 years ago
- Repository of Yara rules created by the Stratosphere team☆26Updated 3 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- various slides and presentations I've worked on☆19Updated 3 months ago
- C# User Simulation☆32Updated 2 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Forked and updated with some additional features over the original☆17Updated 4 years ago
- Tweettioc Splunk App☆20Updated 4 years ago
- ☆15Updated 3 years ago
- ☆22Updated last year
- ProcDot Malware Sandbox☆24Updated 7 months ago
- Surface Analysis System on Cloud☆19Updated last year
- ☆12Updated 3 years ago
- Yara rules☆22Updated 2 years ago
- Analytics for Accounting logs from Network devices☆17Updated 4 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- ☆22Updated 4 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 5 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- Generate YARA rules for OOXML documents.☆38Updated 2 years ago
- Threat Mapping Catalogue☆17Updated 3 years ago
- ☆14Updated 7 years ago
- Links to malware-related YARA rules☆15Updated 2 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- Continuous kerberoast monitor☆45Updated last year
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆37Updated 5 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated last year
- Exploit for win10 SMB3.1☆17Updated 5 years ago