swimlane / pyattck-dataLinks
This repository contains generated contextual data utilized by pyattck.
☆19Updated 6 months ago
Alternatives and similar repositories for pyattck-data
Users that are interested in pyattck-data are comparing it to the libraries listed below
Sorting:
- An extension of the sigma standard to include security metrics.☆15Updated 2 years ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆84Updated 3 months ago
- ☆44Updated 2 months ago
- ☆94Updated last month
- Automatic detection engineering technical state compliance☆55Updated last year
- A home for detection content developed by the delivr.to team☆70Updated last month
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆27Updated 2 months ago
- Look into EDR events from network☆24Updated 4 months ago
- VTC - Velociraptor Timeline Creator☆18Updated last year
- ShellSweeping the evil.☆53Updated last year
- Lightweight Python-Based Malware Analysis Pipeline☆35Updated 2 months ago
- ☆11Updated 2 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆76Updated 2 years ago
- Living off the False Positive!☆40Updated 7 months ago
- Library of threat hunts to get any user started!☆45Updated 5 years ago
- Intel Retrieval Augmented Generation (RAG) Utilities☆90Updated last year
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆25Updated last year
- yara detection rules for hunting with the threathunting-keywords project☆145Updated 4 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆65Updated 3 years ago
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.☆48Updated 4 months ago
- Yara Rules for Modern Malware☆79Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated 9 months ago
- Slides of my public talks☆56Updated last year
- Memory Forensic System on Cloud☆91Updated last year
- Security Content for the PEAK Threat Hunting Framework☆34Updated last year
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated last week
- Repository that contains a set of purposefully erroneous Yara rules.☆58Updated last month
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆40Updated 4 months ago
- The core backend server handling API requests and task management☆47Updated this week
- Track progress and keep notes while working through likethecoins' CTI Self Study Plan☆28Updated 3 years ago