mirror of
https://github.com/pe3zx/my-infosec-awesome.git
synced 2025-01-10 15:19:28 -05:00
[Tools][DFIR] salesforce/bro-sysmon
This commit is contained in:
parent
bf572d0c24
commit
5ef70cc990
@ -1334,6 +1334,10 @@ _return-to-libc techniques_
|
||||
<td><a href="https://github.com/ptresearch/AttackDetection">ptresearch/AttackDetection</a></td>
|
||||
<td>The Attack Detection Team searches for new vulnerabilities and 0-days, reproduces it and creates PoC exploits to understand how these security flaws work and how related attacks can be detected on the network layer. Additionally, we are interested in malware and hackers’ TTPs, so we develop Suricata rules for detecting all sorts of such activities.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="https://github.com/salesforce/bro-sysmon/">salesforce/bro-sysmon</td>
|
||||
<td>Bro-Sysmon enables Bro to receive Windows Event Logs. This provide a method to associate Network Monitoring and Host Monitoring. The work was spurred by the need to associate JA3 and HASSH fingerprints with the application on the host. The example below shows the hostname, Process ID, connection information, JA3 fingerprints, Application Path, and binary hashes.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="https://github.com/SecurityRiskAdvisors/TALR">SecurityRiskAdvisors/TALR</a></td>
|
||||
<td>Threat Alert Logic Repository (TALR) - A public repository for the collection and sharing of detection rules in platform agnostic formats. Collected rules are appended with STIX required fields for simplified sharing over TAXII servers.</td>
|
||||
|
Loading…
Reference in New Issue
Block a user