k3idii / ION
Indicators of Normality
☆12Updated 2 years ago
Alternatives and similar repositories for ION:
Users that are interested in ION are comparing it to the libraries listed below
- ☆33Updated 2 years ago
- Hundred Days of Yara Challenge☆12Updated 2 years ago
- Speaking materials from conferences I've given☆9Updated 2 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Updated last week
- Splunk Technology-AddOn for Aurora Sigma-Based EDR Agent. It helps parse and configure the necessary inputs to neatly consume Aurora EDR …☆13Updated 2 years ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆30Updated 2 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Parser for Windows PowerShell script block logs☆13Updated last month
- Collection of my own detection rules☆15Updated 11 months ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Updated 4 years ago
- ☆12Updated 3 years ago
- Threat Mitigation Strategies☆25Updated last year
- A set of tools for collecting forensic information☆26Updated 4 years ago
- Links to malware-related YARA rules☆14Updated 2 years ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆20Updated 2 years ago
- ☆20Updated last year
- Converts Sigma detection rules to a Splunk alert configuration.☆13Updated 3 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Updated 3 years ago
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆26Updated 2 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated last year
- Parser for Sdba memory pool tags☆17Updated 3 years ago
- A pure PowerShell/ .NET DFIR capability that dumps the Windows SRUM (System Resource Usage Monitor) database to CSVs for analysis.☆13Updated 3 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆13Updated 10 months ago
- ☆22Updated 4 years ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- This is a repository for the public blog with Labs indicators of compromise.☆10Updated 5 years ago
- Generates YARA rules to detect malware using API hashing☆17Updated 3 years ago
- NTFS file system specimens☆14Updated last year
- ☆14Updated 9 months ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆25Updated last year