DeepBlueCLI
A PowerShell module for threat hunting via Windows Event Logs
Miscellaneous tool for checking samples against VirusTotal. Usage: $ python VT_RuleMGR.py -h usage: VT_RuleMGR.py [-h] [--list] [--create FILE] [--delete DELETE] optional arguments: -h, --help show this help message and exit --list List names/ids of Yara rules stored on VT --create FILE Add a Yara rule to VT (File Name used as RuleName --delete DELETE Delete a Yara rule from VT (By Name) Demo:
A PowerShell module for threat hunting via Windows Event Logs
Automatic YARA rule generator based on Koodous reports with limited false positives.
A tool for tracking, scanning, and filtering yara files with distributed scanning capabilities.
Repository of IOCs provided under the Apache 2.0 license
Converts OpenIOC v1.0 XML files into STIX Indicators, generating STIX v1.2 and CybOX v2.1 content.
A Splunk app mapped to MITRE ATT&CK to guide threat hunts.