ail-project / ail-yara-rules
A set of YARA rules for the AIL framework to detect leak or information disclosure
☆38Updated 3 months ago
Alternatives and similar repositories for ail-yara-rules
Users that are interested in ail-yara-rules are comparing it to the libraries listed below
Sorting:
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Tweettioc Splunk App☆20Updated 4 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Cybersecurity Incidents Mind Maps☆33Updated 3 years ago
- various slides and presentations I've worked on☆18Updated last month
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- ☆22Updated 4 years ago
- Forked and updated with some additional features over the original☆17Updated 4 years ago
- C# User Simulation☆32Updated 2 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- ☆15Updated 3 years ago
- Surface Analysis System on Cloud☆19Updated last year
- ☆14Updated 6 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 5 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Analytics for Accounting logs from Network devices☆17Updated 4 years ago
- Yara rules☆21Updated 2 years ago
- Continuous kerberoast monitor☆45Updated last year
- Links to malware-related YARA rules☆15Updated 2 years ago
- Automated Payload Test Controller☆10Updated 7 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆30Updated 7 years ago
- Generate YARA rules for OOXML documents.☆38Updated last year
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated last year
- Threat Mapping Catalogue☆17Updated 3 years ago
- Reproducible and extensible BloodHound playbooks☆43Updated 5 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 5 years ago
- Data exfiltration and covert communication tool☆38Updated 2 years ago
- Repository of Yara rules created by the Stratosphere team☆26Updated 3 years ago