Lists (1)
Sort Name ascending (A-Z)
Stars
Sublime rules for email attack detection, prevention, and threat hunting.
A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more efficient.
Collection of example YARA-L rules for use within Google Security Operations
A curated list of awesome YARA rules, tools, and people.
✨ A curated list of awesome threat detection and hunting resources 🕵️♂️
Cloud-native SIEM for intelligent security analytics for your entire enterprise.
splunk / DoubleX
Forked from Aurore54F/DoubleXStatically Detecting Vulnerable Data Flows in Browser Extensions at Scale