mtnmunuklu / SigmaToExcel
This project used for convert sigma rules to excel
☆9Updated 2 years ago
Alternatives and similar repositories for SigmaToExcel:
Users that are interested in SigmaToExcel are comparing it to the libraries listed below
- You can access the sigma rules to detect malicious activities. It is organized by Mitre Att&ck categories.☆12Updated 2 years ago
- Hunt for Keywords , Mutex, Windows Event,Registry Keys,Process,Schedule tasks in Windows Machine☆22Updated last month
- ☆20Updated 5 months ago
- ☆41Updated 2 years ago
- This is a project of "#Twiti: Social Listening for Threat Intelligence" (TheWebConf 2021)☆171Updated last year
- Yara station is a management portal for Neo23x0-Loki. The mission is to transform the standalone nature of the Loki scanner into a centra…☆36Updated 2 years ago
- Carbon Black Response IR tool☆53Updated 4 years ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆22Updated last year
- Picus Labs☆44Updated 3 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆57Updated 4 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆84Updated 2 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆81Updated last month
- This is a repository that is meant to hold detections for various process injection techniques.☆33Updated 4 years ago
- ATLAS - Malware Analysis Description☆20Updated last year
- Active C2 IoCs☆97Updated 2 years ago
- ☆21Updated last year
- Triaging Windows event logs based on SANS Poster☆38Updated 2 years ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆85Updated 2 years ago
- Notes and IoCs of fresh malware☆59Updated 6 months ago
- Links to malware-related YARA rules☆14Updated 2 years ago
- Open Dataset of Cobalt Strike Beacon metadata (2018-2022)☆125Updated 2 years ago
- IoC Feed for security analysts etc.☆13Updated last year
- Open IOC sharing platform☆54Updated 2 months ago
- Repository collecting and automagically processing public threat intelligence reports.☆18Updated 4 years ago
- Default Detections for EDR☆96Updated 11 months ago
- ☆130Updated last year
- AdHoc solutions☆48Updated last year
- ☆15Updated 4 years ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆164Updated 2 years ago