swisscom / detectionsLinks
Threat intelligence and threat detection indicators (IOC, IOA)
☆52Updated 5 years ago
Alternatives and similar repositories for detections
Users that are interested in detections are comparing it to the libraries listed below
Sorting:
- THOR MITRE ATT&CK Framework Coverage☆25Updated 5 years ago
- pollen - A command-line tool for interacting with TheHive☆36Updated 6 years ago
- Recon Hunt Queries☆79Updated 4 years ago
- Random hunting ordiented yara rules☆98Updated 2 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆45Updated 4 years ago
- A collection of typical false positive indicators☆56Updated 5 years ago
- Simple yara rule manager☆66Updated 3 years ago
- Import specific data sources into the Sigma generic and open signature format.☆79Updated 3 years ago
- Extract BITS jobs from QMGR queue and store them as CSV records☆73Updated 11 months ago
- evtx2json extracts events of interest from event logs, dedups them, and exports them to json.☆41Updated 4 years ago
- pocket guide for core threat hunting concepts☆23Updated 5 years ago
- A Splunk Technology Add-on to forward filtered ETW events.☆30Updated 5 years ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆69Updated 3 years ago
- ☆77Updated 6 years ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator