mthcht / ThreatHunting-Keywords-yara-rulesLinks
yara detection rules for hunting with the threathunting-keywords project
☆127Updated 3 months ago
Alternatives and similar repositories for ThreatHunting-Keywords-yara-rules
Users that are interested in ThreatHunting-Keywords-yara-rules are comparing it to the libraries listed below
Sorting:
- Active C&C Detector☆155Updated last year
- CarbonBlack EDR detection rules and response actions☆71Updated 11 months ago
- Sigma rules to share with the community☆121Updated 6 months ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆84Updated 3 months ago
- ☆69Updated 6 months ago
- ☆41Updated this week
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆124Updated last year
- A specification and style guide for YARA rules☆53Updated last year
- Initial triage of Windows Event logs☆102Updated last year
- Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.☆15Updated last year
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆129Updated this week
- Detection Engineering with YARA☆87Updated last year
- Open IOC sharing platform☆60Updated 9 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Updated 11 months ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆73Updated last month
- ☆34Updated this week
- Intel Retrieval Augmented Generation (RAG) Utilities☆90Updated last year
- Welcome to the SEKOIA.IO Community repository!☆163Updated last month
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆80Updated 3 months ago
- Security Content for the PEAK Threat Hunting Framework☆32Updated last year
- Library of threat hunts to get any user started!☆45Updated 4 years ago
- ShellSweeping the evil.☆179Updated 8 months ago
- Contains compiled binaries of Volatility☆34Updated 3 months ago
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆69Updated 2 months ago
- LOKI2 - Simple IOC and YARA Scanner☆102Updated last month
- ☆141Updated 3 weeks ago
- A home for detection content developed by the delivr.to team☆69Updated last week
- Linux Evidence Acquisition Framework☆119Updated 10 months ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆25Updated last year
- YARA rule analyzer to improve rule quality and performance☆102Updated 4 months ago