ptresearch / AttackDetectionLinks
Attack Detection
☆1,357Updated 2 years ago
Alternatives and similar repositories for AttackDetection
Users that are interested in AttackDetection are comparing it to the libraries listed below
Sorting:
- Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.☆930Updated 2 months ago
- Suricata IDS rules 用来检测红队渗透/恶意行为等,支持检测CobaltStrike/MSF/Empire/DNS隧道/Weevely/菜刀/冰蝎/挖矿/反弹shell/ICMP隧道等☆1,209Updated last year
- Guidance for mitigation web shells. #nsacyber☆976Updated last year
- Utilities for MITRE™ ATT&CK☆1,030Updated last year
- A toolset to make a system look as if it was the victim of an APT attack☆2,601Updated last year
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆1,539Updated 4 years ago
- Simple reverse ICMP shell☆1,590Updated 7 years ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆2,897Updated 11 months ago
- AD Security Intrusion Detection System☆1,293Updated 2 years ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆479Updated last week
- Vulmap Online Local Vulnerability Scanners Project☆967Updated 2 years ago
- ☆710Updated 2 years ago
- A tool to abuse Exchange services☆2,229Updated 11 months ago
- ☆1,073Updated 6 years ago
- APTnotes data☆1,711Updated 5 months ago
- Scirius is a web application for Suricata ruleset management and threat hunting.☆651Updated 2 weeks ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆1,606Updated 6 years ago
- Open Source EDR for Windows☆1,248Updated 2 years ago
- YARA signature and IOC database for my scanners and tools☆2,634Updated last week
- A collection of pentest and development tips☆1,111Updated 3 years ago
- APT & CyberCriminal Campaign Collection☆3,900Updated 10 months ago
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,310Updated last year
- Interesting APT Report Collection And Some Special IOCs☆2,565Updated this week
- Indicators from Unit 42 Public Reports☆711Updated last week
- A Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.☆481Updated 4 years ago
- Windows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.☆1,873Updated 4 years ago
- Tunna is a set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in full…☆1,257Updated 2 years ago
- A Suricata based IDS/IPS/NSM distro☆1,536Updated 9 months ago
- 常见的攻击行为监测特征及方法,涵盖端点和流量,未包含PowerShell和Sysmon。预祝运营生活愉快!☆624Updated this week
- ✍️ A curated list of CVE PoCs.☆3,409Updated 3 years ago