dfir-ronin / APT-OpenIOC-Detection-RulesLinks
This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat groups.
☆25Updated last year
Alternatives and similar repositories for APT-OpenIOC-Detection-Rules
Users that are interested in APT-OpenIOC-Detection-Rules are comparing it to the libraries listed below
Sorting:
- Library of threat hunts to get any user started!☆44Updated 4 years ago
- ☆22Updated 2 years ago
- Placeholder for my detection repo and misc detection engineering content☆42Updated last year
- Threat Detection Rules (Snort/Sigma/Yara)☆13Updated last year
- ☆11Updated 2 years ago
- Sigma detection rules for hunting with the threathunting-keywords project☆55Updated 3 months ago
- Contains compiled binaries of Volatility☆33Updated last month
- Security Content for the PEAK Threat Hunting Framework☆29Updated last year
- An Adaptive Misuse Detection System☆42Updated 7 months ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆79Updated last month
- Augmentation to Machine Readable CTI☆31Updated last month
- ShellSweeping the evil.☆52Updated last year
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.☆15Updated last year
- This repository contains sample log data that were collected after running adversary simulations in Microsoft 365☆21Updated 8 months ago
- User Feedback Space of #MitreAssistant☆37Updated 2 years ago
- yara detection rules for hunting with the threathunting-keywords project☆122Updated last month
- Python library to query various sources of threat intelligence for data on domains, file hashes, and IP addresses.☆31Updated last year
- CarbonBlack EDR detection rules and response actions☆71Updated 9 months ago
- ☆38Updated last week
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- ESXi Cyber Security Incident Response Script☆23Updated 9 months ago
- VelociraptorMCP is a Model Context Protocol bridge for exposing LLMs to MCP clients.☆36Updated last week
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆30Updated last month
- A home for detection content developed by the delivr.to team☆69Updated 3 weeks ago
- pySigma Splunk backend☆39Updated last month
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Updated 2 years ago
- Quick ESXi Log Parser☆21Updated 5 months ago
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆54Updated 2 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated last year