huntresslabs / threat-intelLinks
This repository contains supplemental items including IOCs, and signatures discussed in Huntress blogposts, and other media.
☆39Updated 3 weeks ago
Alternatives and similar repositories for threat-intel
Users that are interested in threat-intel are comparing it to the libraries listed below
Sorting:
- Azure function to insert MISP data in to Azure Sentinel☆32Updated 2 years ago
- Remote access and Antivirus Logging Database☆42Updated last year
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆85Updated 4 months ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆79Updated last month
- A home for detection content developed by the delivr.to team☆69Updated 3 weeks ago
- TIM is a Kusto investigation platform that enables a user to quickly pivot between data sources; annotate their findings; and promotes co…☆22Updated 10 months ago
- CarbonBlack EDR detection rules and response actions☆71Updated 9 months ago
- Memory Baseliner is a script that can compare two windows memory images or perform frequency of occurrence / data stacking analysis on mu…☆54Updated last year
- A collection of tips for using MISP.☆74Updated 6 months ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆73Updated 7 months ago
- ShellSweeping the evil.☆53Updated last year
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆30Updated 2 months ago
- Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations☆89Updated 10 months ago
- A list of RMMs designed to be used in automation to build alerts☆111Updated 2 months ago
- Full of public notes and Utilities☆117Updated 4 months ago
- Baseline a Windows System against LOLBAS☆27Updated last year
- Active C&C Detector☆154Updated last year
- Slides of my public talks☆55Updated last year
- Sigma detection rules for hunting with the threathunting-keywords project☆55Updated 3 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- User Feedback Space of #MitreAssistant☆37Updated 2 years ago
- A pySigma wrapper to manage detection rules.☆39Updated 3 weeks ago
- Documentation site for Velociraptor☆47Updated this week
- YARA rule analyzer to improve rule quality and performance☆102Updated 2 months ago
- pySigma Splunk backend☆39Updated last month
- Pushes Sysmon Configs☆88Updated 4 years ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆41Updated last month
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆48Updated last year
- A preconfigured Velociraptor triage collector☆52Updated last week
- VelociraptorMCP is a Model Context Protocol bridge for exposing LLMs to MCP clients.☆36Updated 2 weeks ago