huntresslabs / threat-intelLinks
This repository contains supplemental items including IOCs, and signatures discussed in Huntress blogposts, and other media.
☆38Updated last week
Alternatives and similar repositories for threat-intel
Users that are interested in threat-intel are comparing it to the libraries listed below
Sorting:
- Azure function to insert MISP data in to Azure Sentinel☆32Updated 2 years ago
- A home for detection content developed by the delivr.to team☆69Updated this week
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆78Updated 2 weeks ago
- VelociraptorMCP is a Model Context Protocol bridge for exposing LLMs to MCP clients.☆27Updated this week
- ShellSweeping the evil.☆52Updated 11 months ago
- Documentation site for Velociraptor☆46Updated last week
- Remote access and Antivirus Logging Database☆42Updated last year
- A pySigma wrapper to manage detection rules.☆39Updated this week
- ESXi Cyber Security Incident Response Script☆22Updated 9 months ago
- Baseline a Windows System against LOLBAS☆27Updated last year
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆38Updated last year
- Sigma detection rules for hunting with the threathunting-keywords project☆55Updated 3 months ago
- pySigma Splunk backend☆38Updated 3 weeks ago
- ☆69Updated 3 months ago
- YARA rule analyzer to improve rule quality and performance☆101Updated last month
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (EXT4, XFS) journals (not systemd-journald), generates…☆64Updated 2 months ago
- The core backend server handling API requests and task management☆39Updated this week
- A collection of tips for using MISP.☆74Updated 5 months ago
- Memory Baseliner is a script that can compare two windows memory images or perform frequency of occurrence / data stacking analysis on mu…☆53Updated last year
- Full of public notes and Utilities☆113Updated 3 months ago
- PS-TrustedDocuments: PowerShell script to handle information on trusted documents for Microsoft Office☆35Updated 2 years ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆41Updated 3 weeks ago
- Yara Rules for Modern Malware☆77Updated last year
- Pushes Sysmon Configs☆88Updated 3 years ago
- Slides of my public talks☆55Updated last year
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆29Updated last month
- ASR Configurator, Essentials and Atomic Testing☆42Updated last month
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated last year
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆85Updated 3 months ago