威胁检测规则集
☆15Jul 5, 2019Updated 6 years ago
Alternatives and similar repositories for ThreatDetectionRules
Users that are interested in ThreatDetectionRules are comparing it to the libraries listed below
Sorting:
- 用于辅助安全工程师漏洞挖掘、测试、复现,集合了mock、httplog、dns tools、xss,可用于测试各类无回显、无法直观判断或特定场景下的漏洞。☆11Apr 2, 2021Updated 4 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- An example of a downloader written in NodeJS.☆24Apr 17, 2021Updated 4 years ago
- Threat Detection System using Hybrid (Machine Learning + Lexical Analysis) learning Approach.☆11May 30, 2017Updated 8 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 5 months ago
- ☆17Jan 22, 2026Updated last month
- Repository collecting and automagically processing public threat intelligence reports.☆19May 1, 2020Updated 5 years ago
- Insider Threat Detection using Isolation Forest☆17Jun 1, 2018Updated 7 years ago
- An open source, cloud native toolkit for threat detection and mitigation☆19Mar 30, 2020Updated 5 years ago
- ☆21May 19, 2016Updated 9 years ago
- 《横向移动攻击与检测技术》专栏文章☆17Sep 5, 2019Updated 6 years ago
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆22Jun 15, 2022Updated 3 years ago
- Advanced Persistent Threat Detection Using Network Analysis☆23Feb 28, 2019Updated 7 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Oct 11, 2020Updated 5 years ago
- zeek-scripts☆44Dec 27, 2018Updated 7 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Mar 5, 2019Updated 7 years ago
- We, Achin and Harekrissna worked as a team to complete the project given to us on Buried threat detection using ground penetrating radar.…☆24Jan 28, 2020Updated 6 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Nov 27, 2020Updated 5 years ago
- ☆35Jun 22, 2021Updated 4 years ago
- Axure9.0/8.0/7.0安装包及汉化插件和元件库☆29May 28, 2019Updated 6 years ago
- Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.☆29Apr 10, 2024Updated last year
- ☆11Feb 9, 2023Updated 3 years ago
- ☆38Nov 2, 2024Updated last year
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- Detect-X Automated Threat Detection by AI☆32Oct 10, 2019Updated 6 years ago
- General Scripts to help with various types of SQL Injection☆30Jan 31, 2014Updated 12 years ago
- ETHICAL-HACKING☆12Dec 20, 2023Updated 2 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- 🌌 Real-time threat detection for smart contracts☆10May 16, 2023Updated 2 years ago
- This is a compiled cheatsheet from my experience of OSCP 2023 journey. Won't say it is all-rounded but a good starting point if you wanna…☆14Oct 17, 2024Updated last year
- 🌶 一些和容器化/容器编排/服务网格等技术相关的安全代码片段[自用备份]☆81Jul 23, 2021Updated 4 years ago
- Advanced threat detection solution for Linux.☆36Dec 5, 2020Updated 5 years ago
- ☆39Dec 4, 2023Updated 2 years ago
- Suricata rules for the new critical vulnerabilities☆84Jan 26, 2021Updated 5 years ago
- Working Demo of Proprietary GE SRTP PLC Communication Protocol (GE Ethernet)☆45Aug 7, 2024Updated last year
- Project that creates a Kubernetes environment in Azure (AKS) and protects it with CloudGuard CSPM / Workload and Appsec technologies☆10Jun 12, 2023Updated 2 years ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- ☆15Sep 7, 2025Updated 6 months ago