ptresearch / AttackDetection
Attack Detection
☆1,352Updated 2 years ago
Alternatives and similar repositories for AttackDetection:
Users that are interested in AttackDetection are comparing it to the libraries listed below
- Suricata IDS rules 用来检测红队渗透/恶意行为等,支持检测CobaltStrike/MSF/Empire/DNS隧道/Weevely/菜刀/冰蝎/挖矿/反弹shell/ICMP隧道等☆1,186Updated last year
- Guidance for mitigation web shells. #nsacyber☆971Updated last year
- Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.☆920Updated last week
- Utilities for MITRE™ ATT&CK☆1,023Updated 10 months ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆471Updated 2 months ago
- YARA signature and IOC database for my scanners and tools☆2,582Updated this week
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆2,861Updated 9 months ago
- Scirius is a web application for Suricata ruleset management and threat hunting.☆645Updated 3 months ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,537Updated last year
- A Suricata based IDS/IPS/NSM distro☆1,518Updated 7 months ago
- yarGen is a generator for YARA rules☆1,621Updated 9 months ago
- Utilities for Sysmon☆1,509Updated 3 weeks ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,510Updated 8 months ago
- AD Security Intrusion Detection System☆1,292Updated last year
- Open Source EDR for Windows☆1,199Updated 2 years ago
- APTnotes data☆1,687Updated 3 months ago
- Home of the dionaea honeypot☆738Updated 7 months ago
- Interesting APT Report Collection And Some Special IOC☆2,523Updated this week
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆1,521Updated 3 years ago
- Vulmap Online Local Vulnerability Scanners Project☆964Updated 2 years ago
- The tool for updating your Suricata rules.☆266Updated 3 months ago
- ☆1,068Updated 5 years ago
- ☆708Updated 2 years ago
- The Correlated CVE Vulnerability And Threat Intelligence Database API☆940Updated 3 years ago
- Detect Tactics, Techniques & Combat Threats☆2,126Updated 2 months ago
- Loki - Simple IOC and YARA Scanner☆3,502Updated 4 months ago
- A tool to abuse Exchange services☆2,214Updated 9 months ago
- Vulnerability Labs for security analysis☆1,167Updated 4 years ago
- Indicators from Unit 42 Public Reports☆709Updated last week
- A collection of pentest and development tips☆1,106Updated 2 years ago