grapl-security / grapl-analyzers
Hosted analyzers built for Grapl
☆13Updated last year
Related projects: ⓘ
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 3 years ago
- This project is no longer maintained. There's a successor at https://github.com/zeek-packages/zeek-agent-v2☆14Updated 3 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Updated 8 years ago
- Bro PCAP Processing and Tagging API☆27Updated 6 years ago
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆21Updated 6 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Updated 6 years ago
- ☆15Updated 6 years ago
- ☆66Updated this week
- ☆11Updated this week
- ☆18Updated last year
- Generate bulk YARA rules from YAML input☆21Updated 4 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 5 years ago
- Command-line Interface for Binar.ly☆37Updated 7 years ago
- FastIR Agent is a Windows service to execute FastIR Collector on demand☆14Updated 7 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆48Updated 2 years ago
- Endpoint monitoring stack.☆17Updated 8 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆28Updated 6 years ago
- ☆47Updated this week
- first commit☆20Updated 10 months ago
- ☆51Updated 6 years ago
- ☆35Updated last year
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆22Updated 7 years ago
- ☆27Updated this week
- Sysmon config for both Windows and Linux Devices. Windows one is a bit dated☆54Updated 2 months ago
- Debian and Red Hat packaging for SIE DNS sensor☆14Updated last year
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆30Updated last year
- Subscriptions to collect Windows Event Logs mapped to the MITRE ATT&CK model☆12Updated 3 years ago
- CyCAT.org taxonomies☆14Updated 3 years ago
- Detect kerberos attacks in pcap files☆27Updated 8 years ago
- Use Markov Chains to obfuscate data as other data☆49Updated 8 years ago