qeeqbox / APT-Malware-Reports-Set-1Links
Some extracted Features\IoCs\Artifacts\Patterns from APT Malware
☆14Updated 5 years ago
Alternatives and similar repositories for APT-Malware-Reports-Set-1
Users that are interested in APT-Malware-Reports-Set-1 are comparing it to the libraries listed below
Sorting:
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated last year
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆59Updated 5 years ago
- Home to the ActorTrackr source code☆29Updated 7 years ago
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23Updated 3 years ago
- ☆24Updated 2 years ago
- Easy way to create a MISP event related to a Phishing page☆17Updated 2 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆30Updated 5 years ago
- ☆34Updated 4 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- Threat Detection Rules (Snort/Sigma/Yara)☆13Updated last year
- ☆18Updated 7 years ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 6 years ago
- Assemblyline 4 Malware detonation service (Cuckoo)☆17Updated last year
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Updated 8 years ago
- Collection of YARA signatures from individual research☆44Updated last year
- Tools used by CSIRT and especially in the scope of CNW☆16Updated 9 months ago
- Validates yara rules and tries to repair the broken ones.☆39Updated 4 years ago
- Modular command-line threat hunting tool & framework.☆17Updated 4 years ago
- Links to malware-related YARA rules☆15Updated 2 years ago
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆63Updated last year
- Simple tool to find the yara matches on a file☆1Updated 6 years ago
- Integration between MISP platform and McAfee MVISION EDR☆14Updated 3 years ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆39Updated 2 years ago
- Python module to use the MISP Taxonomies☆29Updated last week
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆33Updated last week
- Yara rules for detecting malware☆23Updated 9 months ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆42Updated 10 months ago