tcw3bb / ISC_Posts
Files from my Storm Center Articles
☆17Updated 9 months ago
Related projects ⓘ
Alternatives and complementary repositories for ISC_Posts
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆21Updated 6 years ago
- Threat Intelligence distribution☆30Updated 8 years ago
- Integrating Sysinternals Autoruns’ logs into Security Onion☆31Updated 8 months ago
- ☆38Updated 6 years ago
- Security Onion Elastic Stack☆46Updated 3 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆37Updated last month
- Integrate Zeek with Alienvault OTX☆24Updated 4 years ago
- Push "BAD" IPs/Networks into QRadar's "Remote Networks", tag them properly, and use them!☆17Updated 11 years ago
- The Bro/Zeek language cheat sheet☆50Updated 11 years ago
- Harbinger Threat Intelligence☆82Updated 8 years ago
- Network Forensics Bro scripts & pcap samples☆62Updated 10 years ago
- Simple block lists hub for PAN-OS DBL feature☆35Updated 5 years ago
- ☆48Updated 4 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆60Updated 5 years ago
- OSSEC Decoder & Rulesets for Sysmon Events☆15Updated 9 years ago
- Monitoring tool for PasteBin-alike sites written in Python. Inspired by pastemon http://github.com/xme/pastemon☆43Updated 3 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated 11 months ago
- Queries to parse sysmon event log file with microsoft logparser☆56Updated 9 years ago
- This is a script module for Bro that encapsulates and detects activity related to the Mandiant APT1 report.☆47Updated 10 years ago
- Beholder is a shell script which installs and configures essentials to peer into your network activity.☆19Updated 7 years ago
- BRO/Zeek IDS content pack contains pipeline rules, a stream, a dashboard displaying interesting activity, and a syslog tcp input to captu…☆19Updated 4 years ago
- InvestigationPlaybookSpec☆72Updated 7 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆79Updated 8 years ago
- Modular tool to test exfiltration techniques.☆36Updated 7 years ago
- A set of templates for documenting threat intelligence☆73Updated 11 years ago
- Scripts for Bro IDS and ELK Stack☆56Updated 9 years ago