0xrawsec / whids
Open Source EDR for Windows
☆1,151Updated last year
Related projects ⓘ
Alternatives and complementary repositories for whids
- An Active Defense and EDR software to empower Blue Teams☆1,236Updated last year
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,252Updated this week
- Defences against Cobalt Strike☆1,281Updated 2 years ago
- ☆2,012Updated last year
- Utilities for Sysmon☆1,487Updated 5 months ago
- Windows Events Attack Samples☆2,244Updated last year
- Invoke-AtomicRedTeam is a PowerShell module to execute tests as defined in the [atomics folder](https://github.com/redcanaryco/atomic-red…☆844Updated last week
- Elastic Security detection content for Endpoint☆1,041Updated this week
- TrustedSec Sysinternals Sysmon Community Guide☆1,140Updated 5 months ago
- Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.☆899Updated 10 months ago
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆678Updated last week
- ReversingLabs YARA Rules☆760Updated last month
- A collection of red team and adversary emulation resources developed and released by MITRE.☆491Updated 3 years ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆831Updated 2 years ago
- A repository of sysmon configuration modules☆2,658Updated 2 months ago
- ☆1,021Updated 10 months ago
- PCAP Samples for Different Post Exploitation Techniques☆344Updated 3 years ago
- Utilities for MITRE™ ATT&CK☆1,010Updated 5 months ago
- Repository of YARA rules made by Trellix ATR Team☆569Updated 10 months ago
- yarGen is a generator for YARA rules☆1,552Updated 5 months ago
- ☆505Updated last month
- Detect Tactics, Techniques & Combat Threats☆2,062Updated this week
- Open Source Security Events Metadata (OSSEM)☆1,238Updated last year
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,137Updated last year
- A toolset to make a system look as if it was the victim of an APT attack☆2,463Updated last year
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆702Updated last year
- ☆1,049Updated 5 years ago
- ☆525Updated 11 months ago
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆520Updated 2 months ago
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,256Updated 7 months ago