Hunt-Detect-Prevent
Lists of sources and utilities to hunt, detect, and prevent evildoers.
LOKI is a simple IOC and YARA Scanner for Indicators of Compromise Detection. It is based on four detection methods: 1. File Name IOC: Regex match on full file path/name. 2. Yara Rule Check: Yara signature match on file data and process memory. 3. Hash Check: Compares known malicious hashes (MD5, SHA1, SHA256) with scanned files. 4. C2 Back Connect Check: Compares process connection endpoints with C2 IOCs.
Lists of sources and utilities to hunt, detect, and prevent evildoers.
A Python library for interacting with TAXII servers
Provides breach and attack simulation products for security control validation, offering three different products to meet the needs of organizations of various sizes and maturity levels.
VX-Underground is a vast online repository of malware samples, featuring various collections for cybersecurity professionals and researchers to analyze and combat cyber threats.
A summary of the threat modeling posts and final thoughts on the process
A collection of Yara rules licensed under the DRL 1.1 License.