c2links / NoWhere2Hide
C2 Active Scanner
☆45Updated 3 months ago
Related projects: ⓘ
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆49Updated 3 months ago
- Yara Rules for Modern Malware☆68Updated 6 months ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆57Updated last year
- ☆23Updated this week
- Detection Engineering with YARA☆84Updated 8 months ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆61Updated 7 months ago
- A home for detection content developed by the delivr.to team☆56Updated 2 weeks ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆48Updated last year
- Sigma detection rules for hunting with the threathunting-keywords project☆47Updated 2 weeks ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 4 months ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆48Updated 5 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆59Updated 2 months ago
- information about ransomware groups (Ransomware Analysis Notes)☆36Updated 8 months ago
- Active C&C Detector☆148Updated 11 months ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated last year
- YARA rule analyzer to improve rule quality and performance☆93Updated 9 months ago
- CarbonBlack EDR detection rules and response actions☆70Updated last week
- ShellSweeping the evil.☆49Updated 3 months ago
- Cyber Underground General Intelligence Requirements☆85Updated 7 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆108Updated 5 months ago
- Contains compiled binaries of Volatility☆28Updated 2 months ago
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆94Updated last year
- Placeholder for my detection repo and misc detection engineering content☆43Updated 10 months ago
- Rules Shared by the Community from 100 Days of YARA 2023☆76Updated last year
- IOC Collection 2022☆55Updated last year
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆65Updated last month
- A specification and style guide for YARA rules☆34Updated 7 months ago
- BlackBerry Threat Research & Intelligence☆90Updated 10 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆57Updated 8 months ago
- Linux Baseline and Forensic Triage Tool - BETA☆51Updated 2 years ago