karemfaisal / SMUCLinks
Simplified MITRE Use Cases, it describes the Attack and Detection
☆47Updated 5 years ago
Alternatives and similar repositories for SMUC
Users that are interested in SMUC are comparing it to the libraries listed below
Sorting:
- Userland API monitor for threat hunting☆58Updated 5 years ago
- ☆27Updated 3 years ago
- Various capabilities for static malware analysis.☆79Updated last year
- Random hunting ordiented yara rules☆98Updated 2 years ago
- Machine Interrogation To Identify Gaps & Techniques for Execution☆32Updated 3 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆105Updated 2 years ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆19Updated 3 years ago
- A repo to support the book☆112Updated 4 years ago
- TA505+ Adversary Simulation☆65Updated 5 years ago
- Valhalla API Client☆70Updated last week
- The Windows Malware Analysis Reversing Core Tools☆97Updated 5 years ago
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆120Updated 3 years ago
- Malware similarity platform with modularity in mind.☆80Updated 4 years ago
- Notes and IoCs of fresh malware☆59Updated last year
- ☆54Updated 2 years ago
- Carbon Black Response IR tool☆55Updated 5 years ago
- Fraktal's Ransomware Emulator☆101Updated last year
- A powershell parser for https://github.com/ufrisk/MemProcFS☆45Updated 4 years ago
- Malware Configuration Extraction Modules☆51Updated 2 years ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆130Updated 2 years ago
- Standardized Malware Analysis Tool☆56Updated 4 years ago
- Script for parsing Symantec Endpoint Protection logs, VBNs, and ccSubSDK database.☆64Updated 3 years ago
- Public repository for Red Canary Research☆38Updated 5 years ago
- Mindmaps for threat hunting - work in progress.☆152Updated 3 years ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆46Updated 3 years ago
- Manipulate timestamps on NTFS☆52Updated 11 years ago
- Simple PowerShell script to enable process scanning with Yara.☆97Updated 3 years ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Updated 2 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Updated 5 years ago
- isodump - ISO dump utility☆41Updated 6 years ago