This website requires JavaScript.
Explore
Help
Sign In
security-tools
/
blue-team-tools
Watch
1
Star
0
Fork
0
You've already forked blue-team-tools
Code
Issues
Pull Requests
Actions
Packages
Projects
Releases
Wiki
Activity
Files
4e21289bdc82cdc082ba276df1787816fdccf26f
blue-team-tools
/
rules
/
windows
/
malware
T
History
Florian Roth
b0cb0abc01
Bugfix: wrong field for 4688 process creation events
2018-12-11 16:10:15 +01:00
..
av_exploiting.yml
ATT&CK tagging QA
2018-09-20 12:44:44 +02:00
av_password_dumper.yml
ATT&CK tagging QA
2018-09-20 12:44:44 +02:00
av_relevant_files.yml
Update av_relevant_files.yml
2018-12-05 07:53:53 +03:00
av_webshell.yml
ATT&CK tagging QA
2018-09-20 12:44:44 +02:00
sysmon_malware_notpetya.yml
Tagged windows powershell, other and malware rules.
2018-07-24 10:56:41 +02:00
sysmon_malware_wannacry.yml
Simplified rule conditions with new condition constructs
2018-03-06 23:14:43 +01:00
win_mal_adwind.yml
Bugfix: wrong field for 4688 process creation events
2018-12-11 16:10:15 +01:00
win_mal_wannacry.yml
Replace "logsource: description" with "definition" to match the specs
2018-11-15 09:00:06 +03:00