Skip to content

Latest commit

 

History

History
18 lines (8 loc) · 886 Bytes

File metadata and controls

18 lines (8 loc) · 886 Bytes

The detection rules, indicators of compromise, and other materials in this collection are provided by DeTraced Security solely for defensive and educational purposes.

  • They are intended to help defenders, incident responders, and security researchers in keeping their networks safe.

  • They are not intended for offensive or malicious use.

  • The contents of this repository are provided "as is", without any warranty.

DeTraced Security makes no guarantees as to the accuracy, completeness, or effectiveness of these rules and indicators, and accepts no liability for any damages, including but not limited to disruptions or losses resulting from their use.

By using the contents of this repository, you agree that:

  • You are solely responsible for how you use these materials.

  • You will not hold DeTraced Security liable for any direct or indirect consequences of their use .