ptresearch / AttackDetection
Attack Detection
☆1,337Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for AttackDetection
- Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.☆894Updated 2 months ago
- Guidance for mitigation web shells. #nsacyber☆965Updated last year
- Suricata IDS rules 用来检测红队渗透/恶意行为等,支持检测CobaltStrike/MSF/Empire/DNS隧道/Weevely/菜刀/冰蝎/挖矿/反弹shell/ICMP隧道等☆1,129Updated last year
- Interesting APT Report Collection And Some Special IOC☆2,417Updated last week
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆2,729Updated 4 months ago
- Suricata and Snort IDS rule and pcap testing system☆449Updated 2 weeks ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,464Updated last year
- Utilities for MITRE™ ATT&CK☆1,010Updated 5 months ago
- YARA signature and IOC database for my scanners and tools☆2,476Updated last week
- AD Security Intrusion Detection System☆1,291Updated last year
- Vulmap Online Local Vulnerability Scanners Project☆950Updated last year
- Home of the dionaea honeypot☆712Updated 3 months ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆1,489Updated 3 years ago
- A tool to abuse Exchange services☆2,168Updated 5 months ago
- Simple reverse ICMP shell☆1,559Updated 6 years ago
- A collection of pentest and development tips☆1,099Updated 2 years ago
- Linux Exploit Suggester; based on operating system release number☆1,778Updated 10 years ago
- A Suricata based IDS/IPS/NSM distro☆1,477Updated 3 months ago
- Loki - Simple IOC and YARA Scanner☆3,396Updated last week
- Vulnerability Labs for security analysis☆1,158Updated 3 years ago
- Open Source EDR for Windows☆1,151Updated last year
- APTnotes data☆1,656Updated 3 months ago
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆1,799Updated last week
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆1,590Updated 5 years ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,509Updated 4 months ago
- The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.☆3,026Updated 4 years ago
- yarGen is a generator for YARA rules☆1,552Updated 5 months ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆3,966Updated last year
- ☆1,049Updated 5 years ago