drego85 / meiocLinks
Extracting IoC data from eMail
☆133Updated last week
Alternatives and similar repositories for meioc
Users that are interested in meioc are comparing it to the libraries listed below
Sorting:
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆91Updated 7 months ago
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (EXT4, XFS) journals (not systemd-journald), generates…☆64Updated 2 months ago
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆85Updated 3 months ago
- Convert Sigma rules to SIEM queries, directly in your browser.☆81Updated this week
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆105Updated 7 months ago
- Forensic Artifact Collection Tool Matrix☆85Updated 6 months ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆51Updated 7 months ago
- Parses USB connection artifacts from offline Registry hives☆99Updated 4 months ago
- ☆32Updated this week
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆155Updated 2 months ago
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?☆43Updated last week
- CarbonBlack EDR detection rules and response actions☆71Updated 8 months ago
- Incident Response documents and tooling☆74Updated last year
- A collection of tips for using MISP.☆74Updated 5 months ago
- ☆92Updated 3 weeks ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆122Updated last year
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆81Updated 2 weeks ago
- Sigma rules to share with the community☆122Updated 4 months ago
- Linux Baseline and Forensic Triage Tool - BETA☆55Updated 2 years ago
- Sigma detection rules for hunting with the threathunting-keywords project☆55Updated 3 months ago
- Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the syn…☆33Updated 10 months ago
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆171Updated last week
- A collection of CVEs weaponized by ransomware operators☆115Updated last week
- ☆35Updated 7 months ago
- Building a consolidated RSS feed for articles about cyberattacks☆67Updated this week
- The Threat Actor Profile Guide for CTI Analysts☆107Updated last year
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆29Updated last month
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆73Updated 6 months ago
- A list of RMMs designed to be used in automation to build alerts☆110Updated last month
- This repository contains helper scripts and custom configs to get the best out of Google's Timesketch project.☆108Updated last year