ail-project / ail-yara-rules
A set of YARA rules for the AIL framework to detect leak or information disclosure
☆38Updated 6 months ago
Alternatives and similar repositories for ail-yara-rules:
Users that are interested in ail-yara-rules are comparing it to the libraries listed below
- Surface Analysis System on Cloud☆19Updated last year
- C# User Simulation☆32Updated 2 years ago
- Cybersecurity Incidents Mind Maps☆33Updated 3 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Links to malware-related YARA rules☆14Updated 2 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 4 years ago
- Repository of Yara rules created by the Stratosphere team☆26Updated 3 years ago
- ☆15Updated 3 years ago
- Continuous kerberoast monitor☆44Updated last year
- Generate YARA rules for OOXML documents.☆37Updated last year
- Slack C2bot that executes commands and returns the output.☆45Updated last year
- Analytics for Accounting logs from Network devices☆16Updated 3 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- Tweettioc Splunk App☆20Updated 4 years ago
- ☆22Updated last year
- various slides and presentations I've worked on☆18Updated 10 months ago
- A rogue DNS detector☆23Updated last year
- Radare2 Metadata Extraction to Elasticsearch☆21Updated 7 months ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago
- A small utility to deal with malware embedded hashes.☆49Updated last year
- Python emulator for Excel XLM macros.☆18Updated 4 years ago
- A Canary which fires when uninstalled☆34Updated 3 years ago
- ☆23Updated 4 years ago
- Forked and updated with some additional features over the original☆16Updated 3 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆30Updated 4 years ago
- ☆41Updated 9 months ago
- ProcDot Malware Sandbox☆22Updated last month