mthcht / ThreatHunting-Keywords-yara-rules
yara detection rules for hunting with the threathunting-keywords project
☆105Updated 2 weeks ago
Alternatives and similar repositories for ThreatHunting-Keywords-yara-rules:
Users that are interested in ThreatHunting-Keywords-yara-rules are comparing it to the libraries listed below
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆74Updated this week
- Active C&C Detector☆152Updated last year
- CarbonBlack EDR detection rules and response actions☆71Updated 5 months ago
- ☆28Updated this week
- Sigma rules to share with the community☆118Updated 3 weeks ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆118Updated 10 months ago
- Placeholder for my detection repo and misc detection engineering content☆42Updated last year
- ☆65Updated this week
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆89Updated this week
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆85Updated 2 years ago
- A home for detection content developed by the delivr.to team☆67Updated 2 weeks ago
- Detection Engineering with YARA☆87Updated last year
- IOC Collection 2022☆57Updated last year
- Rules Shared by the Community from 100 Days of YARA 2023☆77Updated last year
- ☆29Updated this week
- Intel Retrieval Augmented Generation (RAG) Utilities☆90Updated last year
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆146Updated 5 months ago
- Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.☆15Updated last year
- ShellSweeping the evil.☆52Updated 8 months ago
- A specification and style guide for YARA rules☆45Updated last year
- A C# based tool for analysing malicious OneNote documents☆110Updated last year
- ☆32Updated 10 months ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆76Updated last year
- Mapping of open-source detection rules and atomic tests.☆125Updated last month
- ☆84Updated last week
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆60Updated 9 months ago
- Full of public notes and Utilities☆97Updated last week
- ☆34Updated last year
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆177Updated 2 months ago
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆86Updated last year