mthcht / ThreatHunting-Keywords-yara-rules
yara detection rules for hunting with the threathunting-keywords project
☆113Updated 3 weeks ago
Alternatives and similar repositories for ThreatHunting-Keywords-yara-rules:
Users that are interested in ThreatHunting-Keywords-yara-rules are comparing it to the libraries listed below
- Active C&C Detector☆152Updated last year
- Sigma rules to share with the community☆119Updated last month
- ☆30Updated 2 weeks ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆77Updated last week
- CarbonBlack EDR detection rules and response actions☆71Updated 6 months ago
- A specification and style guide for YARA rules☆45Updated last year
- ☆67Updated last month
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆119Updated 11 months ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆85Updated 2 years ago
- ☆31Updated this week
- Open IOC sharing platform☆56Updated 4 months ago
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆101Updated this week
- A home for detection content developed by the delivr.to team☆67Updated last month
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- Initial triage of Windows Event logs☆96Updated 9 months ago
- Yara Rules for Modern Malware☆74Updated last year
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (EXT4, XFS) journals (not systemd-journald), generates…☆58Updated 2 weeks ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 3 months ago
- Detection Engineering with YARA☆87Updated last year
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆76Updated last year
- ShellSweeping the evil.☆52Updated 9 months ago
- ☆159Updated last year
- Contains compiled binaries of Volatility☆33Updated 2 months ago
- IOC Collection 2022☆57Updated 2 years ago
- Elastic Security Labs releases☆61Updated last week
- The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the hos…☆30Updated 3 years ago
- ☆32Updated last year
- An introduction to detection engineering☆13Updated 2 months ago
- Sigma detection rules for hunting with the threathunting-keywords project☆55Updated 3 weeks ago
- Intel Retrieval Augmented Generation (RAG) Utilities☆90Updated last year