Snort_rules detection bad actors.
☆29Aug 18, 2024Updated last year
Alternatives and similar repositories for Threat-Intelligence-Data
Users that are interested in Threat-Intelligence-Data are comparing it to the libraries listed below
Sorting:
- Coleccion de IRM de Societe Generale traducidos por mí al Español☆35May 12, 2017Updated 8 years ago
- Herramienta para Windows que permite automatizar tareas de Footprint y Fingerprint en un Test de Intrusión☆15Jan 1, 2018Updated 8 years ago
- Popular Ransomware file extensions☆27Jan 16, 2026Updated last month
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- Demo for Elastic's Auditbeat and SIEM☆24Jun 15, 2021Updated 4 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- CertWatcher is a new take on monitoring for phishing sites. It is meant to be a set and forget service that will send you a daily report …☆10Oct 12, 2020Updated 5 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- An assortment of general guides I've currated for general teaching purposes focusing on red / blue team methodologies and tasks.☆13Feb 3, 2018Updated 8 years ago
- A hands-on workshop to learn how to do threat detection and response in AWS.☆11Sep 13, 2021Updated 4 years ago
- Pentest tools for Windows hacking processes☆13May 2, 2017Updated 8 years ago
- Logs Forensic Investigator SSH☆14Oct 27, 2018Updated 7 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Mar 10, 2022Updated 3 years ago
- Terminal Forensics CheatSheets☆13Jul 28, 2015Updated 10 years ago
- Threat Detection System using Hybrid (Machine Learning + Lexical Analysis) learning Approach.☆11May 30, 2017Updated 8 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 5 months ago
- 威胁检测规则集☆15Jul 5, 2019Updated 6 years ago
- ☆13Apr 26, 2016Updated 9 years ago
- Wireless Forensics Framework In Python☆19Jan 29, 2017Updated 9 years ago
- ☆17Jan 22, 2026Updated last month
- Insider Threat Detection using Isolation Forest☆17Jun 1, 2018Updated 7 years ago
- An open source, cloud native toolkit for threat detection and mitigation☆19Mar 30, 2020Updated 5 years ago
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆40May 18, 2022Updated 3 years ago
- Tools for parsing Forensic images☆41Dec 14, 2018Updated 7 years ago
- ☆21May 19, 2016Updated 9 years ago
- Scripts and Modules for forensical analyses of mysql database systems☆22Sep 19, 2014Updated 11 years ago
- Actualización de Huron, distro Linux para Osint☆21Jul 30, 2019Updated 6 years ago
- Snort Rules☆19Mar 9, 2016Updated 10 years ago
- Repositorio donde compartimos con la comunidad scripts de bash relacionados con seguridad (parseadores, escáneres de vulnerabilidades, fo…☆62Mar 15, 2017Updated 8 years ago
- 2020 was a roller coaster of major, world-shaking events. We all couldn't wait for the year to end. But just as 2020 was about to close, …☆20Mar 26, 2022Updated 3 years ago
- Advanced Persistent Threat Detection Using Network Analysis☆23Feb 28, 2019Updated 7 years ago
- AYY LMAO☆22Mar 26, 2016Updated 9 years ago
- Shared yara rules☆30Mar 17, 2014Updated 11 years ago
- A dataset containing Office 365 Unified Audit Logs for security research and detection☆58Jun 7, 2022Updated 3 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Jul 27, 2022Updated 3 years ago
- Script that checks for available updates for the most commonly used Digital Forensics tools☆60Dec 10, 2020Updated 5 years ago
- VirusTotal SIEM Integration and Automation☆18Jan 16, 2017Updated 9 years ago
- The Grum Spam Bot☆20Feb 25, 2015Updated 11 years ago
- Security Tool Builder: project to automate the building of hacking tools☆21Mar 7, 2022Updated 4 years ago