GCTI Open Source Detection Signatures Logo

GCTI Open Source Detection Signatures

0
Free
Visit Website

GCTI's open source detection signatures repository contains a collection of open-source detection signatures for various malware and threats. These signatures are designed to be used with various security tools and systems to detect and prevent malicious activities. The repository is maintained by GCTI and is updated regularly to include new signatures and improve detection capabilities.

FEATURES

ALTERNATIVES

Repository of YARA rules for identifying and classifying malware.

An IOC tracker written in Python that queries Google Custom Search Engines for various cybersecurity indicators and monitors domain status using Google Safe Browsing APIs.

Get insights into the latest cybersecurity trends and expert advice on enhancing organizational security.

Powershell Threat Hunting Module for scanning remote endpoints and collecting comprehensive information.

Python-based client for IBM XForce Exchange with an improved version available.

Tool for managing Yara rules on VirusTotal

A repository to aid Windows threat hunters in looking for common artifacts.

A library of adversary emulation plans to evaluate defensive capabilities against real-world threats.