ptresearch / AttackDetectionLinks
Attack Detection
☆1,364Updated 3 years ago
Alternatives and similar repositories for AttackDetection
Users that are interested in AttackDetection are comparing it to the libraries listed below
Sorting:
- Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.☆949Updated 2 weeks ago
- Suricata IDS rules 用来检测红队渗透/恶意行为等,支持检测CobaltStrike/MSF/Empire/DNS隧道/Weevely/菜刀/冰蝎/挖矿/反弹shell/ICMP隧道等☆1,233Updated 2 years ago
- Guidance for mitigation web shells. #nsacyber☆981Updated 2 years ago
- Utilities for MITRE™ ATT&CK☆1,039Updated last year
- Suricata, Snort and Zeek IDS rule and pcap testing system☆494Updated last month
- AD Security Intrusion Detection System☆1,312Updated 2 years ago
- APTnotes data☆1,746Updated 9 months ago
- Vulmap Online Local Vulnerability Scanners Project☆970Updated 2 years ago
- Scirius is a web application for Suricata ruleset management and threat hunting.☆664Updated last week
- ☆712Updated 2 years ago
- Some results of my DGA reversing efforts☆678Updated 5 months ago
- By Kprobe technology Open Source Host-based Intrusion Detection System(HIDS), from E_Bwill.☆602Updated 4 years ago
- Home of the dionaea honeypot☆770Updated last year
- Mirror of https://github.com/zeek/zeek☆176Updated 2 years ago
- Interesting APT Report Collection And Some Special IOCs☆2,675Updated last week
- A Suricata based NDR distribution☆1,565Updated this week
- Indicators from Unit 42 Public Reports☆721Updated 3 weeks ago
- ☆483Updated 3 years ago
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆809Updated 5 years ago
- YARA signature and IOC database for my scanners and tools☆2,734Updated last week
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,325Updated last year
- A toolset to make a system look as if it was the victim of an APT attack☆2,652Updated 2 years ago
- The tool for updating your Suricata rules.☆279Updated 2 months ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆2,997Updated 2 weeks ago
- 威胁情报,恶意样本分析,开源Malware代码收集☆346Updated 5 years ago
- ☆1,085Updated 6 years ago
- Utilities for Sysmon☆1,544Updated 6 months ago
- Suspicious DGA from PDNS and Sandbox.☆186Updated 3 years ago
- A collection of pentest and development tips☆1,122Updated 3 years ago
- 常见的攻击行为监测特征及方法,涵盖端点和流量,未包含PowerShell和Sysmon。预祝运营生活愉快!☆640Updated 2 months ago