VT_RuleMGR.py Logo

VT_RuleMGR.py

0
Free
Visit Website

Miscellaneous tool for checking samples against VirusTotal. Usage: $ python VT_RuleMGR.py -h usage: VT_RuleMGR.py [-h] [--list] [--create FILE] [--delete DELETE] optional arguments: -h, --help show this help message and exit --list List names/ids of Yara rules stored on VT --create FILE Add a Yara rule to VT (File Name used as RuleName --delete DELETE Delete a Yara rule from VT (By Name) Demo:

FEATURES

ALTERNATIVES

A threat hunting capability that leverages Sysmon and MITRE ATT&CK on Azure Sentinel

Threat hunting tool leveraging Windows events for identifying outliers and suspicious behavior.

An informational repo about hunting for adversaries in your IT environment.

Globally-accessible knowledge base of adversary tactics and techniques for cybersecurity.

The Ransomware Tool Matrix is a repository that lists and categorizes tools used by ransomware gangs, aiding in threat hunting, incident response, and adversary emulation.

Maldatabase is a threat intelligence platform providing malware datasets and threat intelligence feeds for malware data science and threat intelligence.

Check if an IP address was used as a Tor relay on a given date.

A set of configuration files to use with EclecticIQ's OpenTAXII implementation for MISP integration.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved