ptresearch / AttackDetectionLinks
Attack Detection
☆1,361Updated 3 years ago
Alternatives and similar repositories for AttackDetection
Users that are interested in AttackDetection are comparing it to the libraries listed below
Sorting:
- Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.☆957Updated 4 months ago
- AD Security Intrusion Detection System☆1,320Updated 2 years ago
- Suricata IDS rules 用 来检测红队渗透/恶意行为等,支持检测CobaltStrike/MSF/Empire/DNS隧道/Weevely/菜刀/冰蝎/挖矿/反弹shell/ICMP隧道等☆1,260Updated 2 years ago
- Guidance for mitigation web shells. #nsacyber☆981Updated 2 years ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆512Updated last week
- Utilities for MITRE™ ATT&CK☆1,047Updated 2 weeks ago
- Scirius is a web application for Suricata ruleset management and threat hunting.☆672Updated 3 weeks ago
- By Kprobe technology Open Source Host-based Intrusion Detection System(HIDS), from E_Bwill.☆604Updated 4 years ago
- Mirror of https://github.com/zeek/zeek☆176Updated 2 years ago
- ☆713Updated 3 years ago
- Vulmap Online Local Vulnerability Scanners Project☆970Updated 2 years ago
- Some results of my DGA reversing efforts☆687Updated 3 months ago
- ☆481Updated last month
- APTnotes data☆1,766Updated last year
- A collection of pentest and development tips☆1,126Updated 3 years ago
- 常见的攻击行为监测特征及方法,涵盖端点和流量,未包含PowerShell和Sysmon。预祝运营生活愉快!☆643Updated this week
- virtual honeypots☆392Updated 2 years ago
- Home of the dionaea honeypot☆787Updated last year
- A Suricata based NDR distribution☆1,586Updated 4 months ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,039Updated 3 months ago
- Simple reverse ICMP shell☆1,611Updated 7 years ago
- HaboMalHunter is a sub-project of Habo Malware Analysis System (https://habo.qq.com), which can be used for automated malware analysis an…☆746Updated 2 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆1,579Updated 4 years ago
- Indicators from Unit 42 Public Reports☆728Updated 5 months ago
- APT & CyberCriminal Campaign Collection☆4,036Updated last year
- Interesting APT Report Collection And Some Special IOCs☆2,853Updated last week
- ☆1,093Updated 6 years ago
- A package for capturing and analyzing network flow data and intraflow data, for network research, forensics, and security monitoring.☆1,356Updated last year
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆823Updated 5 years ago
- Super Next generation Advanced Reactive honEypot☆472Updated last year