cisagov / ioc-scannerLinks
Search a filesystem for indicators of compromise (IoC).
☆81Updated last month
Alternatives and similar repositories for ioc-scanner
Users that are interested in ioc-scanner are comparing it to the libraries listed below
Sorting:
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆80Updated last month
- ☆73Updated 2 years ago
- ☆88Updated 8 months ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆129Updated 5 years ago
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆242Updated 7 months ago
- ☆55Updated 4 years ago
- A GeoIP lookup utility utilizing ipinfo.io services.☆92Updated last year
- A port of BHIS's Backdoors & Breaches for playingcards.io☆64Updated 2 years ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆75Updated 5 years ago
- CrowdStrike's Open Source Policy & Contribution Guide☆45Updated last month
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆26Updated last year
- Tools for simulating threats☆197Updated 2 years ago
- ☆120Updated 2 weeks ago
- an awesome list of active defense resources☆126Updated 5 years ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆256Updated 2 years ago
- Cast is an installer for any compatible Saltstack based distribution like SIFT or REMnux☆131Updated this week
- Conference presentations☆60Updated 3 weeks ago
- ☆78Updated last week
- The FASTEST way to consume threat intel.☆69Updated 2 years ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆117Updated last year
- ☆81Updated last year
- Corelight@Home script☆45Updated 2 years ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆48Updated 5 months ago
- Collection of useful Canary tools☆92Updated last week
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆68Updated last year
- This code snippet retrieves Azure Sentinel rules that are mapped to MITRE ATT&CK Framework and generates the related MITRE D3FEND defense…☆73Updated 4 years ago
- A collection of tips for using MISP.☆74Updated 11 months ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆112Updated 3 years ago
- Convert Sigma rules to Wazuh rules☆73Updated 2 months ago
- Creating a hardened "Blue Forest" with Server 2016/2019 Domain Controllers☆264Updated last year