br-data / 2019-winnti-analyse
Scripts and rulesets for analysing the Winnti malware
☆24Updated 5 years ago
Alternatives and similar repositories for 2019-winnti-analyse
Users that are interested in 2019-winnti-analyse are comparing it to the libraries listed below
Sorting:
- Repository with selected IOCs and YARA rules for threat hunting.☆35Updated 4 months ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated last year
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆48Updated 2 years ago
- Dashboards for conducting forensic investigation using windows events in Kibana☆17Updated 6 years ago
- Malware similarity platform with modularity in mind.☆78Updated 3 years ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 5 years ago
- Simple yara rule manager☆66Updated 2 years ago
- Steezy - Ghetto Yara Generation☆15Updated 2 years ago
- ☆16Updated last month
- A rewrite of mactime, a bodyfile reader☆37Updated 9 months ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- ☆14Updated 6 years ago
- The Intelligent Process Lifecycle of Active Cyber Defenders☆31Updated 2 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- Community modules for FAME☆65Updated 3 months ago
- References for FIRST CTI 2019 Symposium presentation☆22Updated 6 years ago
- Documentation and parsers for different anti-virus quarantine formats.☆42Updated 4 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Blackcert monitors Certificate Transparency Logs for a keyword. Blackcert collects any certificate changes for this keyword and also chec…☆9Updated 2 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- A collection of typical false positive indicators☆55Updated 4 years ago
- Configurations for DFIR ORC☆27Updated last year
- Paper and Links to Crimeware in the Modern Era☆31Updated 5 years ago
- ☆16Updated last year
- A YARA Rule Performance Measurement Tool☆59Updated last year
- XOR Key Extractor☆50Updated 9 months ago
- Elasticsearch/Kibana environment and log data for Sigma workshop☆26Updated 5 years ago
- Defensomania is a security monitoring and incident response card game.☆62Updated last year
- ☆34Updated 6 months ago
- Converts Sigma detection rules to a Splunk alert configuration.☆13Updated 3 years ago