daffainfo / suricata-rules
Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web application attacks
☆33Updated 5 months ago
Related projects: ⓘ
- BlueBox Malware analysis Box and Cyber threat intelligence.☆38Updated 2 years ago
- Black Hat 2023 Exploiting K8S☆20Updated last year
- Packet captures of malicious traffic for analysis using Wireshark☆53Updated last year
- ☆42Updated 5 months ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆104Updated 2 years ago
- Showcase of DNS Exfiltration and Infiltration☆40Updated 3 years ago
- Security Operation Center Lab☆15Updated 10 months ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆83Updated 5 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆57Updated 8 months ago
- ☆60Updated this week
- ☆12Updated 2 years ago
- ReconPal: Leveraging NLP for Infosec☆54Updated 2 years ago
- Slides and materials for conference presentations☆12Updated last year
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆19Updated 9 months ago
- Really can protect from ransomware encryption?☆41Updated 4 months ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆55Updated 10 months ago
- Cyber Security Awareness Framework (CSAF)☆83Updated this week
- First iteration of ML based Feedback WAF☆54Updated 6 months ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated last year
- ☆31Updated 2 weeks ago
- Cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for them☆26Updated 6 months ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆46Updated 2 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆57Updated last year
- This Repository gives the best and possible strategies against hunting the ransomware☆24Updated 2 years ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆40Updated this week
- Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.☆15Updated 10 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆93Updated last year
- yara detection rules for hunting with the threathunting-keywords project☆75Updated last week
- Repository of tools and resources for analyzing Docker containers☆57Updated 10 months ago
- Sniffing out well-known threat groups☆28Updated last month