spyre-project / spyre
simple YARA-based IOC scanner
☆164Updated this week
Related projects ⓘ
Alternatives and complementary repositories for spyre
- Signature engine for all your logs☆161Updated last year
- Automatically create YARA rules from malicious documents.☆207Updated 2 years ago
- Import specific data sources into the Sigma generic and open signature format.☆77Updated 2 years ago
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆90Updated last year
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆98Updated 2 months ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆144Updated 8 months ago
- Collecting & Hunting for IOCs with gusto and style☆236Updated 3 years ago
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆104Updated 6 years ago
- IOC from articles, tweets for archives☆311Updated 11 months ago
- Sigma rules from Joe Security☆203Updated 2 weeks ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆84Updated last year
- ☆158Updated 3 years ago
- Cross-platform Yara scanner written in Go☆330Updated last year
- Set of Yara rules for finding files using magics headers☆135Updated 4 years ago
- ☆168Updated 4 months ago
- Live forensic artifacts collector☆160Updated 4 months ago
- How to Zeek Sysmon Logs!☆101Updated 2 years ago
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆364Updated 2 years ago
- Anything Sysmon related from the MSTIC R&D team☆146Updated 5 months ago
- Django web interface for managing Yara rules☆190Updated 6 years ago
- Threat Alert Logic Repository☆89Updated 5 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆255Updated 5 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆60Updated 11 months ago
- User guide of MISP☆259Updated last month
- Cuckoo running in a nested hypervisor☆128Updated 4 years ago
- Golang Parser for Microsoft Event Logs☆98Updated 3 months ago
- Sigma Detection Rule Repository☆85Updated 4 years ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆285Updated 7 years ago
- c2 traffic☆188Updated last year
- Log Entry to Sigma Rule Converter☆105Updated 2 years ago