maurapintor / unica_mlsec_labsLinks
☆11Updated 10 months ago
Alternatives and similar repositories for unica_mlsec_labs
Users that are interested in unica_mlsec_labs are comparing it to the libraries listed below
Sorting:
- ☆20Updated 2 years ago
- An Adaptive Misuse Detection System☆44Updated 11 months ago
- My Notes from Hugging Face AI Agents Course☆19Updated 8 months ago
- Open Dataset of Cobalt Strike Beacon metadata (2018-2022)☆127Updated 3 years ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆81Updated 3 weeks ago
- Active C&C Detector☆156Updated 2 years ago
- Code for BH21 talk: "Generating YARA Rules by Classifying Malicious Byte Sequences"☆17Updated 8 months ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- ☆26Updated 3 years ago
- Placeholder for my detection repo and misc detection engineering content☆42Updated 2 years ago
- Threat feeds designed to extract adversarial TTPs and IOCs, using: ✨AI✨☆37Updated last week
- This is a repository that is meant to hold detections for various process injection techniques.☆34Updated 5 years ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆90Updated last year
- ☆10Updated 2 years ago
- ShellSweeping the evil.☆53Updated last year
- The home of the SDDLMaker☆27Updated 9 months ago
- Cobalt Strike Beacon configuration extractor and parser.☆157Updated 4 years ago
- Default Detections for EDR☆96Updated last year
- ☆33Updated 3 years ago
- ☆11Updated 2 years ago
- Yara Rules for Modern Malware☆79Updated last year
- ☆85Updated 2 years ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆66Updated 3 years ago
- Simple PowerShell script to enable process scanning with Yara.☆96Updated 3 years ago
- Transformer Neural Network from Dynamic Malware Detection☆37Updated last year
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆38Updated last year
- This is a repo for fetching Applocker event log by parsing the win-event log☆31Updated 3 years ago
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆179Updated 4 months ago
- YARA rule analyzer to improve rule quality and performance☆105Updated 6 months ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Updated 2 years ago