markuskont / pikksilm
Look into EDR events from network
☆23Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for pikksilm
- ☆41Updated 7 months ago
- Living off the False Positive!☆29Updated 2 months ago
- A Yara Lua output script for Suricata☆19Updated 5 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆65Updated 2 years ago
- Automatic detection engineering technical state compliance☆50Updated 4 months ago
- Tweettioc Splunk App☆20Updated 4 years ago
- Hundred Days of Yara Challenge☆12Updated 2 years ago
- A repository of Sysmon For Linux configuration modules☆15Updated 3 years ago
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆25Updated 2 years ago
- yara detection rules for hunting with the threathunting-keywords project☆87Updated this week
- Threat Mapping Catalogue☆17Updated 3 years ago
- Surface Analysis System on Cloud☆19Updated 11 months ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆57Updated 2 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 2 years ago
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 2 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- ShellSweeping the evil.☆52Updated 5 months ago
- Automated detection rule analysis utility☆29Updated 2 years ago
- Kerberoast Detection Script☆30Updated 3 weeks ago
- An Adaptive Misuse Detection System☆29Updated 2 weeks ago
- ☆12Updated 2 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated last year
- Public IoCs about log4j CVE-2021-44228☆9Updated 2 years ago
- Links to malware-related YARA rules☆14Updated 2 years ago
- Library of threat hunts to get any user started!☆40Updated 4 years ago
- Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.☆15Updated last year
- An experimental Velociraptor implementation using cloud infrastructure☆21Updated last week