pr0xylife / Qakbot
☆195Updated last year
Alternatives and similar repositories for Qakbot:
Users that are interested in Qakbot are comparing it to the libraries listed below
- Sigma rules to share with the community☆119Updated last month
- ☆124Updated 3 weeks ago
- Rules generated from our investigations.☆192Updated this week
- Some Threat Hunting queries useful for blue teamers☆125Updated 2 years ago
- ☆514Updated 5 months ago
- IOC Collection 2022☆57Updated 2 years ago
- MAL-CL (Malicious Command-Line)☆310Updated 2 years ago
- ☆130Updated last year
- Awesome list of keywords and artifacts for Threat Hunting sessions☆553Updated 3 weeks ago
- ☆67Updated last month
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆201Updated 2 years ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆279Updated 7 months ago
- Active C&C Detector☆152Updated last year
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆85Updated 2 years ago
- A repository of my own Sigma detection rules.☆157Updated 6 months ago
- ☆159Updated last year
- The Threat Actor Profile Guide for CTI Analysts☆107Updated last year
- A python script developed to process Windows memory images based on triage type.☆261Updated last year
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆132Updated last year
- ☆96Updated 3 months ago
- Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.☆165Updated this week
- Welcome to the SEKOIA.IO Community repository!☆143Updated last week
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆183Updated 3 months ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆195Updated 8 months ago
- ☆200Updated 4 months ago
- Set of SIGMA rules (>350) mapped to MITRE ATT&CK tactic and techniques☆352Updated 2 months ago
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆217Updated this week
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆149Updated last year
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆165Updated 2 years ago
- yara detection rules for hunting with the threathunting-keywords project☆110Updated 3 weeks ago