pr0xylife / Qakbot
☆196Updated last year
Alternatives and similar repositories for Qakbot:
Users that are interested in Qakbot are comparing it to the libraries listed below
- Sigma rules to share with the community☆118Updated 3 weeks ago
- ☆112Updated this week
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆200Updated 2 years ago
- ☆514Updated 4 months ago
- ☆96Updated 2 months ago
- IOC Collection 2022☆57Updated last year
- Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.☆159Updated this week
- Some Threat Hunting queries useful for blue teamers☆124Updated 2 years ago
- ☆130Updated last year
- Rules generated from our investigations.☆193Updated 3 months ago
- Active C&C Detector☆152Updated last year
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆177Updated 2 months ago
- A repository of my own Sigma detection rules.☆157Updated 5 months ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆277Updated 5 months ago
- Welcome to the SEKOIA.IO Community repository!☆140Updated last week
- Threat Hunting queries for various attacks☆228Updated this week
- ☆199Updated last year
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆193Updated 7 months ago
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆131Updated 11 months ago
- ☆65Updated this week
- Awesome list of keywords and artifacts for Threat Hunting sessions☆522Updated this week
- The Threat Actor Profile Guide for CTI Analysts☆104Updated last year
- A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat in…☆237Updated this week
- MAL-CL (Malicious Command-Line)☆309Updated 2 years ago
- ☆199Updated 3 months ago
- Repository of attack and defensive information for Business Email Compromise investigations☆246Updated 3 weeks ago
- ☆158Updated last year
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆165Updated 2 years ago
- A python script developed to process Windows memory images based on triage type.☆260Updated last year
- A ProcessMonitor visualization application written in rust.☆178Updated last year