k3idii / IONLinks
Indicators of Normality
☆11Updated 2 years ago
Alternatives and similar repositories for ION
Users that are interested in ION are comparing it to the libraries listed below
Sorting:
- ☆12Updated 4 years ago
- Splunk Technology-AddOn for Aurora Sigma-Based EDR Agent. It helps parse and configure the necessary inputs to neatly consume Aurora EDR …☆13Updated 2 years ago
- Hundred Days of Yara Challenge☆12Updated 3 years ago
- ☆33Updated 3 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated 2 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Updated 5 months ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- Resources and Discussions About Detection Engineering☆12Updated 2 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Updated 4 years ago
- Parser for Windows PowerShell script block logs☆13Updated 6 months ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 4 years ago
- Epimitheus is a tool that uses graphical database Neo4j for Windows Events visualization.☆19Updated 3 years ago
- Collection of generic YARA rules☆16Updated last year
- General Content☆26Updated last year
- This is a repo for fetching Applocker event log by parsing the win-event log☆31Updated 2 years ago
- Yara rules☆22Updated 2 years ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- Parser for Sdba memory pool tags☆18Updated 3 years ago
- ShellSweeping the evil.☆53Updated last year
- ☆23Updated 2 years ago
- Speaking materials from conferences I've given☆9Updated 2 years ago
- ☆18Updated 2 weeks ago
- Collection of my own detection rules☆20Updated last week
- Converts Sigma detection rules to a Splunk alert configuration.☆13Updated 4 years ago
- Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant data☆13Updated 5 years ago
- ☆21Updated 4 months ago
- ☆22Updated 9 months ago
- Generate YARA rules for OOXML documents.☆38Updated 2 years ago
- ☆34Updated 2 years ago