dfir-ronin / APT-OpenIOC-Detection-Rules
This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat groups.
☆24Updated last year
Alternatives and similar repositories for APT-OpenIOC-Detection-Rules:
Users that are interested in APT-OpenIOC-Detection-Rules are comparing it to the libraries listed below
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- Library of threat hunts to get any user started!☆44Updated 4 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated 11 months ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Security Content for the PEAK Threat Hunting Framework☆28Updated last year
- Threat Detection Rules (Snort/Sigma/Yara)☆13Updated last year
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated last year
- ShellSweeping the evil.☆52Updated 9 months ago
- ☆11Updated last year
- Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.☆15Updated last year
- Open IOC sharing platform☆56Updated 5 months ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated last year
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆59Updated 2 years ago
- Contains compiled binaries of Volatility☆33Updated 2 months ago
- my MSTICpy practice and custom tools repository☆11Updated 5 months ago
- Living off the False Positive!☆35Updated 2 months ago
- An Adaptive Misuse Detection System☆38Updated 5 months ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆26Updated last month
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…