xme / SANS-ISCLinks
Data related to the SANS Internet Storm Center
☆11Updated last week
Alternatives and similar repositories for SANS-ISC
Users that are interested in SANS-ISC are comparing it to the libraries listed below
Sorting:
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Updated 6 years ago
- ☆54Updated 5 years ago
- A collection of typical false positive indicators☆55Updated 4 years ago
- ☆39Updated 5 years ago
- DocBleachShell is the integration of the great DocBleach, https://github.com/docbleach/DocBleach Content Disarm and Reconstruction tool i…☆21Updated 3 years ago
- pocket guide for core threat hunting concepts☆23Updated 5 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Updated 6 years ago
- A Splunk Technology Add-on to forward filtered ETW events.☆30Updated 4 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 6 years ago
- Validates yara rules and tries to repair the broken ones.☆40Updated 5 years ago
- This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.☆34Updated 6 years ago
- Mass Triage Tools☆20Updated 7 months ago
- Site for IWS book content☆17Updated 6 years ago
- DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).☆16Updated 5 years ago
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Updated 7 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 7 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 7 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆23Updated last year
- Tools for parsing Forensic images☆41Updated 6 years ago
- MacOS incident Response Toolkit. Mostly written while stuck on a NJTransit train.☆20Updated 5 years ago
- Konrads' Pen-Ultimate (Windows) Log File Parser☆14Updated 3 years ago
- Check IOC provided by a MISP instance on Suricata events☆18Updated 6 years ago
- Synopsis is a tool to aid analysts reviewing browser history files by providing a high-level “synopsis” of key information.☆21Updated 6 years ago
- ☆14Updated 7 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Carve $MFT records from a chunk of data (for instance a memory dump)☆16Updated 9 years ago
- evtx2json extracts events of interest from event logs, dedups them, and exports them to json.☆42Updated 4 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year