lacework / lacework-labs
☆19Updated 2 years ago
Alternatives and similar repositories for lacework-labs:
Users that are interested in lacework-labs are comparing it to the libraries listed below
- D-Scan project for office document analysis and generating flow diagram of macro in documents. For demo visit☆29Updated 4 months ago
- Manticore's Public Threats Repository☆10Updated 4 years ago
- Cybersecurity Incidents Mind Maps☆33Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 4 months ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- ☆12Updated 3 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 4 years ago
- Powershell / C# based cross platform forensic framework based for live incident response☆23Updated 4 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- Data exfiltration and covert communication tool☆38Updated 2 years ago
- Automated Static Analysis Framework☆9Updated 3 years ago
- ProcDot Malware Sandbox☆22Updated 4 months ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- QuasarRAT analysis tools and research report☆27Updated last year
- Links to malware-related YARA rules☆15Updated 2 years ago
- Analytics for Accounting logs from Network devices☆17Updated 4 years ago
- Tweettioc Splunk App☆20Updated 4 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- Generate bulk YARA rules from YAML input☆22Updated 5 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated last month
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- C# User Simulation☆32Updated 2 years ago
- This is a repository for the public blog with Labs indicators of compromise and code☆18Updated 5 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- Exploit for win10 SMB3.1☆17Updated 4 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 5 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Catalog Red Team techniques that cause popups in various macOS versions☆14Updated 4 months ago
- Apfell implant written in C#.☆8Updated 4 years ago