xme / SANS-ISCLinks
Data related to the SANS Internet Storm Center
☆11Updated 2 weeks ago
Alternatives and similar repositories for SANS-ISC
Users that are interested in SANS-ISC are comparing it to the libraries listed below
Sorting:
- ☆54Updated 4 years ago
- A collection of typical false positive indicators☆55Updated 4 years ago
- Randori: Like Aiki. With a couple of Dans under its belt.☆14Updated 7 years ago
- References for FIRST CTI 2019 Symposium presentation☆22Updated 6 years ago
- Integrating Sysinternals Autoruns’ logs into Security Onion☆31Updated last year
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Updated 6 years ago
- A bunch of scripts I use to work with urlscan.io☆34Updated 5 years ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 6 years ago
- ☆53Updated 7 years ago
- Splunk App to assist Sysmon Threat Hunting☆38Updated 8 years ago
- This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.☆34Updated 6 years ago
- Create a MS Word index file from PowerPoint notes and slides☆44Updated 4 years ago
- This repository is created to add value to existing Network Security Monitoring solutions.☆42Updated 8 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Updated 6 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 7 years ago
- pocket guide for core threat hunting concepts☆23Updated 5 years ago
- Different tools, koen.vanimpe@cudeso.be☆136Updated last week
- Appendix resources for Intrinsec's "Amélioration des capacités de détection" handbook.☆13Updated 7 years ago
- repo for sharing stuff☆17Updated last month
- Zeek package to generate a SMB client fingerprint☆27Updated 5 years ago
- Universal Honey Pot☆29Updated 2 years ago
- Various Modules & Scripts for use with Viper Framework☆27Updated 5 years ago
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Updated 7 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆41Updated 6 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆23Updated last year
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆17Updated 6 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- Synopsis is a tool to aid analysts reviewing browser history files by providing a high-level “synopsis” of key information.☆21Updated 6 years ago
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 6 years ago