tianyulab / ThreatDetectionRulesView external linksLinks
威胁检测规则集
☆15Jul 5, 2019Updated 6 years ago
Alternatives and similar repositories for ThreatDetectionRules
Users that are interested in ThreatDetectionRules are comparing it to the libraries listed below
Sorting:
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- 用于辅助安全工程师漏洞挖掘、测试、复现,集合了mock、httplog、dns tools、xss,可用于测试各类无回显、无法直观判断或特定场景下的漏洞。☆12Apr 2, 2021Updated 4 years ago
- An example of a downloader written in NodeJS.☆24Apr 17, 2021Updated 4 years ago
- A hands-on workshop to learn how to do threat detection and response in AWS.☆11Sep 13, 2021Updated 4 years ago
- ☆17Jan 22, 2026Updated 3 weeks ago
- Repository collecting and automagically processing public threat intelligence reports.☆18May 1, 2020Updated 5 years ago
- An open source, cloud native toolkit for threat detection and mitigation☆19Mar 30, 2020Updated 5 years ago
- Insider Threat Detection using Isolation Forest☆17Jun 1, 2018Updated 7 years ago
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆22Jun 15, 2022Updated 3 years ago
- ☆21May 19, 2016Updated 9 years ago
- 《横向移动攻击与检测技术》专栏文章☆17Sep 5, 2019Updated 6 years ago
- windows基线脚本(powershell)☆38Apr 2, 2022Updated 3 years ago
- Advanced Persistent Threat Detection Using Network Analysis☆23Feb 28, 2019Updated 6 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Oct 11, 2020Updated 5 years ago
- A series of Bro Scripts created for detection purposes.☆19Nov 18, 2016Updated 9 years ago
- zeek-scripts☆45Dec 27, 2018Updated 7 years ago
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Sep 23, 2020Updated 5 years ago
- We, Achin and Harekrissna worked as a team to complete the project given to us on Buried threat detection using ground penetrating radar.…☆24Jan 28, 2020Updated 6 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Mar 5, 2019Updated 6 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Nov 27, 2020Updated 5 years ago
- ☆35Jun 22, 2021Updated 4 years ago
- Snort_rules detection bad actors.☆29Aug 18, 2024Updated last year
- Axure9.0/8.0/7.0安装包及汉化插件和元件库☆29May 28, 2019Updated 6 years ago
- ☆11Feb 9, 2023Updated 3 years ago
- ☆38Nov 2, 2024Updated last year
- General Scripts to help with various types of SQL Injection☆30Jan 31, 2014Updated 12 years ago
- ETHICAL-HACKING☆12Dec 20, 2023Updated 2 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- This is a compiled cheatsheet from my experience of OSCP 2023 journey. Won't say it is all-rounded but a good starting point if you wanna…☆14Oct 17, 2024Updated last year
- ☆39Dec 4, 2023Updated 2 years ago
- Suricata rules for the new critical vulnerabilities☆85Jan 26, 2021Updated 5 years ago
- Working Demo of Proprietary GE SRTP PLC Communication Protocol (GE Ethernet)☆45Aug 7, 2024Updated last year
- A set of zeek scripts providing a module for tracking and correlating abnormal DNS behavior.☆36Jan 4, 2025Updated last year
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Import Mitre Att&ck into Neo4j database☆39Dec 8, 2022Updated 3 years ago
- Wireshark dissector for GE-FANUC Service Request Transfer Protocol☆11Jan 7, 2023Updated 3 years ago
- Contains research.splunk.com site code☆11Apr 10, 2024Updated last year
- ☆15Sep 7, 2025Updated 5 months ago
- Document Library☆11Dec 21, 2025Updated last month