All Projects → Signature Base → Similar Projects or Alternatives

1130 Open source projects that are alternatives of or similar to Signature Base

Loki
Loki - Simple IOC and Incident Response Scanner
Stars: ✭ 2,217 (+82.92%)
Mutual labels:  hash, dfir, scanner, yara, signature, ioc
Threatingestor
Extract and aggregate threat intelligence.
Stars: ✭ 439 (-63.78%)
Python Iocextract
Defanged Indicator of Compromise (IOC) Extractor.
Stars: ✭ 300 (-75.25%)
Mutual labels:  dfir, threat-intelligence, yara, ioc
Patrowldocs
PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform
Stars: ✭ 105 (-91.34%)
Patrowlengines
PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform
Stars: ✭ 162 (-86.63%)
Patrowlmanager
PatrOwl - Open Source, Smart and Scalable Security Operations Orchestration Platform
Stars: ✭ 363 (-70.05%)
Lw Yara
Yara Ruleset for scanning Linux servers for shells, spamming, phishing and other webserver baddies
Stars: ✭ 78 (-93.56%)
Mutual labels:  dfir, yara, signature
MindMaps
#ThreatHunting #DFIR #Malware #Detection Mind Maps
Stars: ✭ 224 (-81.52%)
YAFRA
YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
Stars: ✭ 22 (-98.18%)
Yobi
Yara Based Detection Engine for web browsers
Stars: ✭ 39 (-96.78%)
Mutual labels:  scanner, dfir, yara
Awesome Yara
A curated list of awesome YARA rules, tools, and people.
Stars: ✭ 1,394 (+15.02%)
Mutual labels:  threat-hunting, yara, ioc
Analyzer
🔍 Offline Analyzer for extracting features, artifacts and IoCs from Windows, Linux, Android, iPhone, Blackberry, macOS binaries, emails and more
Stars: ✭ 108 (-91.09%)
Mutual labels:  threat-intelligence, yara, ioc
Dnstwist
Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
Stars: ✭ 3,124 (+157.76%)
yara-rules
Yara rules written by me, for free use.
Stars: ✭ 13 (-98.93%)
Mutual labels:  dfir, yara, threat-intelligence
MalwareHashDB
Malware hashes for open source projects.
Stars: ✭ 31 (-97.44%)
Mutual labels:  ioc, hash, threat-intelligence
Analyst Arsenal
A toolkit for Security Researchers
Stars: ✭ 112 (-90.76%)
Intelowl
Intel Owl: analyze files, domains, IPs in multiple ways from a single API at scale
Stars: ✭ 2,114 (+74.42%)
Mthc
All-in-one bundle of MISP, TheHive and Cortex
Stars: ✭ 134 (-88.94%)
Judge-Jury-and-Executable
A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQLite or CSV. Threats and data can be probed harnessing the power and syntax of SQL.
Stars: ✭ 66 (-94.55%)
Mutual labels:  scanner, threat-hunting, yara
SSHapendoes
Capture passwords of login attempts on non-existent and disabled accounts.
Stars: ✭ 31 (-97.44%)
censys-recon-ng
recon-ng modules for Censys
Stars: ✭ 29 (-97.61%)
Azure-Sentinel-4-SecOps
Microsoft Sentinel SOC Operations
Stars: ✭ 140 (-88.45%)
detection
Detection in the form of Yara, Snort and ClamAV signatures.
Stars: ✭ 70 (-94.22%)
Mutual labels:  ioc, yara
sqhunter
A simple threat hunting tool based on osquery, Salt Open and Cymon API
Stars: ✭ 64 (-94.72%)
yara-validator
Validates yara rules and tries to repair the broken ones.
Stars: ✭ 37 (-96.95%)
Mutual labels:  dfir, yara
ir scripts
incident response scripts
Stars: ✭ 17 (-98.6%)
Mutual labels:  dfir, threat-hunting
malware-persistence
Collection of malware persistence and hunting information. Be a persistent persistence hunter!
Stars: ✭ 109 (-91.01%)
Malware-Sample-Sources
Malware Sample Sources
Stars: ✭ 214 (-82.34%)
ThreatIntelligence
Tracking APT IOCs
Stars: ✭ 23 (-98.1%)
sophos-central-api-connector
Leverage Sophos Central API
Stars: ✭ 17 (-98.6%)
Mutual labels:  ioc, threat-hunting
Scrummage
The Ultimate OSINT and Threat Hunting Framework
Stars: ✭ 355 (-70.71%)
coronavirus-covid-19-SARS-CoV-2-IoCs
All the IOC's I have gathered which are used directly involved coronavirus / covid-19 / SARS-CoV-2 cyber attack campaigns
Stars: ✭ 67 (-94.47%)
Mutual labels:  ioc, threat-intelligence
AutonomousThreatSweep
Threat Hunting queries for various attacks
Stars: ✭ 70 (-94.22%)
memory signature
A small wrapper class providing an unified interface to search for various memory signatures
Stars: ✭ 69 (-94.31%)
Mutual labels:  scanner, signature
OSINT-Brazuca
Repositório criado com intuito de reunir informações, fontes(websites/portais) e tricks de OSINT dentro do contexto Brasil.
Stars: ✭ 508 (-58.09%)
IronNetTR
Threat research and reporting from IronNet's Threat Research Teams
Stars: ✭ 36 (-97.03%)
pybinaryedge
Python 3 Wrapper for the BinaryEdge API https://www.binaryedge.io/
Stars: ✭ 16 (-98.68%)
factual-rules-generator
Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.
Stars: ✭ 62 (-94.88%)
Mutual labels:  dfir, yara
rhq
Recon Hunt Queries
Stars: ✭ 66 (-94.55%)
Mutual labels:  dfir, threat-hunting
freki
🐺 Malware analysis platform
Stars: ✭ 327 (-73.02%)
Mutual labels:  yara, threat-intelligence
threat-intel
Signatures and IoCs from public Volexity blog posts.
Stars: ✭ 130 (-89.27%)
Mutual labels:  yara, threat-intelligence
fastfinder
Incident Response - Fast suspicious file finder
Stars: ✭ 116 (-90.43%)
Mutual labels:  dfir, threat-hunting
Stalkphish
StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.
Stars: ✭ 256 (-78.88%)
Ioc Explorer
Explore Indicators of Compromise Automatically
Stars: ✭ 73 (-93.98%)
Misp Galaxy
Clusters and elements to attach to MISP events or attributes (like threat actors)
Stars: ✭ 276 (-77.23%)
Detectionlabelk
DetectionLabELK is a fork from DetectionLab with ELK stack instead of Splunk.
Stars: ✭ 273 (-77.48%)
Mutual labels:  dfir, threat-hunting
Ioc2rpz
ioc2rpz is a place where threat intelligence meets DNS.
Stars: ✭ 67 (-94.47%)
Mutual labels:  threat-intelligence, ioc
Attackdatamap
A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework
Stars: ✭ 264 (-78.22%)
Mutual labels:  dfir, threat-hunting
Freki
🐺 Malware analysis platform
Stars: ✭ 285 (-76.49%)
Mutual labels:  threat-intelligence, yara
Misp
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
Stars: ✭ 3,485 (+187.54%)
Gosint
The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).
Stars: ✭ 482 (-60.23%)
Mutual labels:  threat-intelligence, ioc
Ethereumjs Util
Project is in active development and has been moved to the EthereumJS monorepo.
Stars: ✭ 534 (-55.94%)
Mutual labels:  hash, signature
Watcher
Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.
Stars: ✭ 324 (-73.27%)
Awesome Iocs
A collection of sources of indicators of compromise.
Stars: ✭ 526 (-56.6%)
Mutual labels:  signature, ioc
Klara
Kaspersky's GReAT KLara
Stars: ✭ 565 (-53.38%)
Besafe
BeSafe is robust threat analyzer which help to protect your desktop environment and know what's happening around you
Stars: ✭ 21 (-98.27%)
Sysmontools
Utilities for Sysmon
Stars: ✭ 903 (-25.5%)
Virustotal Tools
Submits multiple domains to VirusTotal API
Stars: ✭ 29 (-97.61%)
Mutual labels:  scanner, ioc
Beagle
Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.
Stars: ✭ 976 (-19.47%)
Mutual labels:  dfir, threat-hunting
Threathunting
A Splunk app mapped to MITRE ATT&CK to guide your threat hunts
Stars: ✭ 738 (-39.11%)
Mutual labels:  dfir, threat-hunting
1-60 of 1130 similar projects