plast ("Programme Libre d’Analyse STatique" in French) is a command-line and heavily modular threat-hunting tool. It comes with several modules that allow processing of multiple data sources, trigger automatic action(s) upon detection, and produce customized output. plast's engine uses YARA under the hood, leveraged through multiprocessing tasks to perform rule-based detection on multiple types of input. The main goal of the plast project is to provide an efficient and effortless way to detect indicators of compromise during incident-response operations. It provides a comprehensive framework that easily allows adding functionalities to the tool in just a few lines of code, without worrying about efficiency and scalability. plast embeds all referenced modules in one single tool, allowing it to be used on the field as a standalone utility. plast is entirely written in Python 3, making it compatible with all GNU/Linux, BSD, and macOS distributions. Nevertheless, some minimal dependencies are required. Note that running plast on Microsoft Windows operating systems is totally untested at the moment.
FEATURES
ALTERNATIVES
A collection of companies that disclose adversary TTPs after being breached, useful for analysis of intrusions.
A community-driven project sharing detection logic, adversary tradecraft, and resources to make detection development more efficient, following MITRE ATT&CK structure.
A free software that calculates the security ranking of Internet Service Providers to detect malicious activities.
The Ransomware Tool Matrix is a repository that lists and categorizes tools used by ransomware gangs, aiding in threat hunting, incident response, and adversary emulation.
MISP is an open source threat intelligence platform that enhances threat information sharing and analysis.
Maltego transform pack for analyzing and graphing Honeypots using MySQL data.
A nonprofit security organization that collects and shares threat data to make the Internet more secure.
A repository of Yara signatures under the GNU-GPLv2 license for the cybersecurity community.
PINNED

ImmuniWeb® Discovery
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Check Point CloudGuard WAF
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.

Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.