carbonblack / tau-toolsView external linksLinks
A repo containing tools developed by Carbon Black's Threat Research Team: Threat Analysis Unit
☆240Jul 22, 2021Updated 4 years ago
Alternatives and similar repositories for tau-tools
Users that are interested in tau-tools are comparing it to the libraries listed below
Sorting:
- Collection of useful, up to date, Carbon Black Response Queries☆84Oct 23, 2020Updated 5 years ago
- VMware Carbon Black Cloud Python SDK☆44Jun 27, 2025Updated 7 months ago
- Detecting ATT&CK techniques & tactics for Linux☆257Oct 1, 2020Updated 5 years ago
- Toolset for research malware and Cobalt Strike beacons☆211Mar 11, 2025Updated 11 months ago
- ☆115Jan 31, 2024Updated 2 years ago
- Automatically create YARA rules from malicious documents.☆212May 16, 2022Updated 3 years ago
- Repository of YARA rules made by Trellix ATR Team☆623Mar 18, 2025Updated 10 months ago
- Command line interface to Carbon Black Response☆38May 12, 2020Updated 5 years ago
- Active C2 IoCs☆99Nov 28, 2022Updated 3 years ago
- Carbon Black API - Python language bindings☆145Aug 22, 2024Updated last year
- Actionable analytics designed to combat threats☆1,006May 25, 2022Updated 3 years ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆724Dec 26, 2022Updated 3 years ago
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- Miscellaneous Malware RE☆195May 1, 2022Updated 3 years ago
- Re-play Security Events☆1,723Mar 20, 2024Updated last year
- ☆128Feb 2, 2025Updated last year
- Sample queries for Advanced hunting in Microsoft 365 Defender☆2,048Feb 17, 2022Updated 3 years ago
- Lazarus analysis tools and research report☆57Dec 22, 2023Updated 2 years ago
- Random hunting ordiented yara rules☆96Mar 27, 2023Updated 2 years ago
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,173Jul 26, 2023Updated 2 years ago
- AutoMacTC: Automated Mac Forensic Triage Collector☆558Mar 31, 2022Updated 3 years ago
- Threat Hunting & Incident Investigation with Osquery☆216Mar 30, 2022Updated 3 years ago
- TheHiveIRPlaybook is a collection of TheHive case templates used for Incident Response☆13Jul 13, 2020Updated 5 years ago
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.☆252Jul 19, 2021Updated 4 years ago
- YARA signature and IOC database for my scanners and tools☆2,864Feb 5, 2026Updated last week
- Analyze binaries collected in VMware Carbon Black EDR against Yara rules.☆38Jan 17, 2023Updated 3 years ago
- Automated detection rule analysis utility☆28Sep 22, 2022Updated 3 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆107Feb 12, 2023Updated 3 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Nov 27, 2020Updated 5 years ago
- Awesome VirusTotal Intelligence Search Queries☆331May 16, 2023Updated 2 years ago
- Carbon Black Feeds☆73Apr 4, 2023Updated 2 years ago
- Carbon Black - Facebook Threat Exchange Connector☆13May 1, 2023Updated 2 years ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆513Aug 6, 2019Updated 6 years ago
- Windows Events Attack Samples☆2,507Jan 24, 2023Updated 3 years ago
- Indicators of Compromises (IOC) of our various investigations☆1,914Jan 30, 2026Updated 2 weeks ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Apr 25, 2022Updated 3 years ago
- Detect Tactics, Techniques & Combat Threats☆2,263Jan 21, 2026Updated 3 weeks ago
- c2 traffic☆195Feb 6, 2023Updated 3 years ago
- Utilities for Sysmon☆1,569Sep 21, 2025Updated 4 months ago