fkie-cad / socbedLinks
A Self-Contained Open-Source Cyberattack Experimentation Testbed
☆41Updated 2 weeks ago
Alternatives and similar repositories for socbed
Users that are interested in socbed are comparing it to the libraries listed below
Sorting:
- An Adaptive Misuse Detection System☆40Updated 7 months ago
- YaraScanner is a file pattern-matching tool based on YARA rules.☆57Updated 2 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- Lightweight Python-Based Malware Analysis Pipeline☆34Updated 3 weeks ago
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆62Updated 2 weeks ago
- ☆80Updated 2 years ago
- Standardized Malware Analysis Tool☆52Updated 4 years ago
- ☆42Updated last year
- Yara Based Detection Engine for web browsers☆47Updated 3 years ago
- Look into EDR events from network☆23Updated last month
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆29Updated last month
- Python based CLI for MalwareBazaar☆37Updated 7 months ago
- ☆15Updated 3 years ago
- An extension of the sigma standard to include security metrics.☆15Updated 2 years ago
- Automatic detection engineering technical state compliance☆55Updated 10 months ago
- Reads and prints information from the website MalAPI.io☆19Updated 2 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated last year
- A MITRE Caldera plugin☆43Updated 6 months ago
- A home for detection content developed by the delivr.to team☆69Updated this week
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆78Updated 2 weeks ago
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆30Updated 2 months ago
- File analysis and management framework.☆83Updated last year
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆69Updated 3 years ago
- Linux #rootkit and #malware revealer☆25Updated 10 months ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆83Updated last year
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆77Updated last year
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆31Updated last month
- Links to malware-related YARA rules☆15Updated 2 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆76Updated 2 years ago