pan-unit42 / tweetsLinks
☆131Updated last year
Alternatives and similar repositories for tweets
Users that are interested in tweets are comparing it to the libraries listed below
Sorting:
- Sigma rules from Joe Security☆229Updated last year
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Updated 2 years ago
- ☆77Updated 3 months ago
- ☆150Updated 2 months ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆208Updated 3 years ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆170Updated 3 years ago
- YARA rule analyzer to improve rule quality and performance☆107Updated 8 months ago
- ☆212Updated 7 months ago
- JPCERT/CC public YARA rules repository☆110Updated last month
- Blueteam operational triage registry hunting/forensic tool.☆150Updated 4 months ago
- Active C2 IoCs☆99Updated 3 years ago
- A python script developed to process Windows memory images based on triage type.☆265Updated 2 years ago
- Live forensic artifacts collector☆172Updated last year
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆114Updated this week
- Anything Sysmon related from the MSTIC R&D team☆155Updated last year
- OSSEM Detection Model☆182Updated 3 years ago
- Signatures and IoCs from public Volexity blog posts.☆361Updated last month
- Threat Hunting tool about Sysmon and graphs☆335Updated 2 years ago
- ☆92Updated 5 months ago
- Detection Ideas & Rules repository.☆178Updated 4 years ago
- Sysmon EDR POC Build within Powershell to prove ability.☆226Updated 4 years ago
- ☆194Updated last year
- MAL-CL (Malicious Command-Line)☆323Updated 2 years ago
- ☆96Updated 8 months ago
- Collection of rules created using YARA-Signator over Malpedia☆142Updated last year
- IOC from articles, tweets for archives☆319Updated 2 years ago
- Research indicators and detection rules☆67Updated 2 years ago
- Place for resources used during the Mordor Detection hackathon event featuring APT29 ATT&CK evals datasets☆145Updated 5 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Updated 3 years ago
- A guide on how to write fast and memory friendly YARA rules☆162Updated 10 months ago