spyre-project / spyreLinks
simple YARA-based IOC scanner
☆169Updated 2 weeks ago
Alternatives and similar repositories for spyre
Users that are interested in spyre are comparing it to the libraries listed below
Sorting:
- Signature engine for all your logs☆172Updated last year
- Automatically create YARA rules from malicious documents.☆212Updated 3 years ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆158Updated 6 months ago
- IOC from articles, tweets for archives☆319Updated last year
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆88Updated 2 years ago
- Golang Parser for Microsoft Event Logs☆105Updated 3 months ago
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆79Updated last week
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆62Updated last year
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆107Updated 5 months ago
- A Go implementation of JARM☆119Updated 3 years ago
- Import specific data sources into the Sigma generic and open signature format.☆78Updated 3 years ago
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆385Updated 3 years ago
- ☆175Updated last year
- Set of Yara rules for finding files using magics headers☆140Updated 5 years ago
- Collecting & Hunting for IOCs with gusto and style☆241Updated 4 years ago
- SIGMA UI is a free open-source application based on the Elastic stack and Sigma Converter (sigmac)☆189Updated 4 years ago
- Cross-platform Yara scanner written in Go☆328Updated 2 years ago
- ☆78Updated 5 years ago
- ☆166Updated 4 years ago
- Live forensic artifacts collector☆172Updated last year
- c2 traffic☆191Updated 2 years ago
- ☆128Updated 8 months ago
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆110Updated 7 years ago
- Sigma rules from Joe Security☆223Updated 11 months ago
- Repository containing IOCs, CSV and MISP JSON from our blogs☆81Updated 4 years ago
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆144Updated 2 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Updated 3 months ago
- Proofpoint - Emerging Threats - Threat Research tools + publicly shared intel and documentation☆79Updated last month
- A VBA parser and emulation engine to analyze malicious macros.☆96Updated 2 months ago
- Cisco Orbital - Osquery queries by Talos☆135Updated last year