montysecurity / YaraMonitorLinks
Framework for Monitoring File Ingestion Source for Yara Matches
☆47Updated 3 months ago
Alternatives and similar repositories for YaraMonitor
Users that are interested in YaraMonitor are comparing it to the libraries listed below
Sorting:
- Living Off Security Tools☆45Updated 7 months ago
- Addon for BHCE☆47Updated 2 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 8 months ago
- A simple tool designed to create Atomic Red Team tests with ease.☆44Updated 3 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆112Updated 2 weeks ago
- ☆24Updated 4 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40Updated 2 years ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆77Updated last week
- ☆17Updated this week
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆80Updated 9 months ago
- Repository that contains a set of purposefully erroneous Yara rules.☆51Updated last year
- ☆73Updated last week
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆54Updated 8 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated last year
- Rules shared by the community from 100 Days of YARA 2025☆33Updated 4 months ago
- ☆37Updated last year
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆51Updated 3 months ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆75Updated 2 months ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Updated last month
- Mapping of open-source detection rules and atomic tests.☆168Updated 5 months ago
- Convert Sigma rules to SIEM queries, directly in your browser.☆89Updated this week
- https://lolad-project.github.io/☆77Updated 5 months ago
- Persist like a Dodder☆61Updated last month
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆82Updated last year
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated 9 months ago
- An index of publicly available and open-source threat detection rulesets.☆114Updated 2 months ago
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆77Updated 8 months ago
- Baseline a Windows System against LOLBAS☆27Updated last year
- Hijack a slack bot to phish your way in☆55Updated 2 months ago
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆85Updated 2 months ago