Repository of automatically generated YARA rules from Malpedia's YARA-Signator with detailed statistics.
ThreatTracker is an IOC tracker written in Python that periodically queries 4 Google Custom Search Engines to identify new AV definitions, malware sample submissions, malicious URLs and domains, and performs Reverse WHOIS lookup. It also monitors domain status using the Google Safe Browsing Lookup API and Google Safebrowsing Diagnosis Page. Requirements include Google APIs Client Library for Python, 1 Gmail account (to act as sender), and Google API key(s). To use the script, rules must be created in the /rules directory. Note: A sample rule (for tracking Dridex) is provided to highlight the required format. This project is still in beta, so bug reports are welcome. For questions, new data sources, or ideas, feel free to email the developer.
Repository of automatically generated YARA rules from Malpedia's YARA-Signator with detailed statistics.
YARA signature and IOC database for LOKI and THOR Lite scanners with high quality rules and IOCs.
Dorothy is a tool to test monitoring and detection capabilities for Okta environments, with modules mapped to MITRE ATT&CK® tactics.
Container of 200 Windows EVTX samples for testing detection scripts and training on DFIR.
A framework for managing cyber threat intelligence in structured formats.
Tool for visualizing correspondences between YARA ruleset and samples