karemfaisal / SMUC
Simplified MITRE Use Cases, it describes the Attack and Detection
☆43Updated 4 years ago
Alternatives and similar repositories for SMUC:
Users that are interested in SMUC are comparing it to the libraries listed below
- Random hunting ordiented yara rules☆95Updated last year
- Three datasets to practice Threat Hunting against.☆43Updated last year
- Userland API monitor for threat hunting☆58Updated 5 years ago
- Research indicators and detection rules☆66Updated last year
- Various capabilities for static malware analysis.☆77Updated 6 months ago
- YARA rule analyzer to improve rule quality and performance☆97Updated 3 months ago
- Machine Interrogation To Identify Gaps & Techniques for Execution☆32Updated 2 years ago
- Cuckoo running in a nested hypervisor☆128Updated 4 years ago
- Malware similarity platform with modularity in mind.☆78Updated 3 years ago
- Capa analysis importer for Ghidra.☆61Updated 4 years ago
- Collection of useful, up to date, Carbon Black Response Queries☆83Updated 4 years ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆58Updated 2 years ago
- mod to myaut2exe decompiler☆13Updated 7 years ago
- A repo to document API functions mapped to security events across diverse platforms☆75Updated 5 years ago
- Links to malware-related YARA rules☆15Updated 2 years ago
- Dump of organized knowledge on DFIR☆133Updated 3 years ago
- ☆27Updated 3 years ago
- ☆116Updated last year
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Updated 11 months ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆44Updated 3 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆53Updated 11 months ago
- Simple yara rule manager☆66Updated 2 years ago
- Script for parsing Symantec Endpoint Protection logs, VBNs, and ccSubSDK database.☆64Updated 2 years ago
- Python based CLI for MalwareBazaar☆36Updated 4 months ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆63Updated 2 years ago
- Hunt malware with Volatility☆47Updated 10 months ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆102Updated 2 years ago
- Lokix Platform is a free open-source solution to help blue teams and threat hunters use Loki Scanner to sweep enterprise networks☆25Updated 4 years ago
- A VBA parser and emulation engine to analyze malicious macros.☆95Updated last month
- Collection of YARA signatures from individual research☆44Updated last year