Loginsoft-Research
Vulnerability Research | Threat Research | Threat Intelligence | ZeroDay Discovery
Loginsoft
Pinned Repositories
rules
Falco rule repository
Linux-Exploit-Detection
Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma
OVAL-Repository
Loginsoft's OVAL repository for the security content
Rego-CNS
Rego policies for Cloud Native Security
threat-detection-rules
Threat Detection & Anomaly Detection rules for popular open-source components
Vulnerability-and-Security-Compliance-Research
Vulnerability and Security Compliance Research
zeek-scripts
zeek scripts for CVE detection and Threat Hunt
Loginsoft-Research's Repositories
Loginsoft-Research/zeek-scripts
zeek scripts for CVE detection and Threat Hunt