drego85 / meioc
Extracting IoC data from eMail
☆133Updated 4 months ago
Alternatives and similar repositories for meioc
Users that are interested in meioc are comparing it to the libraries listed below
Sorting:
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (EXT4, XFS) journals (not systemd-journald), generates…☆63Updated last month
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆88Updated 6 months ago
- Convert Sigma rules to SIEM queries, directly in your browser.☆75Updated last week
- Forensic Artifact Collection Tool Matrix☆84Updated 6 months ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆73Updated 5 months ago
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆142Updated last week
- Initial triage of Windows Event logs☆97Updated 10 months ago
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆50Updated 3 months ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆156Updated last month
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆103Updated 7 months ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆80Updated this week
- MISP Playbooks☆199Updated 3 months ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆51Updated 6 months ago
- Fast IOC and YARA Scanner☆79Updated 5 years ago
- Parses USB connection artifacts from offline Registry hives☆97Updated 3 months ago
- Finding ClickFix and FakeCAPTCHA like it's 1999☆36Updated this week
- A list of RMMs designed to be used in automation to build alerts☆110Updated last month
- This repository contains a comprehensive list of over 30k dynamic DNS domains as of 2024. The list is provided for informational purposes…☆95Updated 4 months ago
- The Threat Actor Profile Guide for CTI Analysts☆106Updated last year
- A collection of tips for using MISP.☆74Updated 5 months ago
- Building a consolidated RSS feed for articles about cyberattacks☆67Updated this week
- ☆88Updated 3 months ago
- ☆32Updated 2 weeks ago
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆170Updated 2 months ago
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆84Updated 3 months ago
- Website for ail-typo-squatting library☆58Updated 11 months ago
- Sigma detection rules for hunting with the threathunting-keywords project☆55Updated 2 months ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆41Updated last year
- Cyber Underground General Intelligence Requirements☆92Updated last year
- Baseline a Windows System against LOLBAS☆26Updated last year