spyre-project / spyre
simple YARA-based IOC scanner
☆164Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for spyre
- Signature engine for all your logs☆160Updated 11 months ago
- Automatically create YARA rules from malicious documents.☆208Updated 2 years ago
- Import specific data sources into the Sigma generic and open signature format.☆77Updated 2 years ago
- Set of Yara rules for finding files using magics headers☆135Updated 4 years ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆144Updated 8 months ago
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆89Updated last year
- Cross-platform Yara scanner written in Go☆330Updated last year
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆285Updated 7 years ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆98Updated 2 months ago
- IOC from articles, tweets for archives☆310Updated 10 months ago
- Sigma rules from Joe Security☆203Updated this week
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆104Updated 6 years ago
- Collecting & Hunting for IOCs with gusto and style☆238Updated 3 years ago
- ☆168Updated 4 months ago
- Anything Sysmon related from the MSTIC R&D team☆146Updated 5 months ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆84Updated last year
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆363Updated 2 years ago
- ☆158Updated 3 years ago
- SIGMA UI is a free open-source application based on the Elastic stack and Sigma Converter (sigmac)☆184Updated 3 years ago
- Cisco Orbital - Osquery queries by Talos☆122Updated 2 months ago
- Golang Parser for Microsoft Event Logs☆98Updated 3 months ago
- Live forensic artifacts collector☆160Updated 4 months ago
- Threat Hunting tool about Sysmon and graphs☆329Updated last year
- c2 traffic☆188Updated last year
- 🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.☆258Updated last year
- A Go implementation of JARM☆119Updated 2 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆255Updated 5 years ago
- A VBA parser and emulation engine to analyze malicious macros.☆91Updated this week
- Suricata rules for network anomaly detection☆153Updated 2 months ago
- YARA Rules I come across on the internet☆333Updated 6 months ago