3CORESec / MAL-CL
MAL-CL (Malicious Command-Line)
☆308Updated last year
Related projects ⓘ
Alternatives and complementary repositories for MAL-CL
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆194Updated 2 years ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆268Updated 2 months ago
- #ThreatHunting #DFIR #Malware #Detection Mind Maps☆280Updated 2 years ago
- A python script developed to process Windows memory images based on triage type.☆258Updated 11 months ago
- Misc Threat Hunting Resources☆371Updated last year
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆584Updated 4 months ago
- A repository of DFIR-related Mind Maps geared towards the visual learners!☆515Updated 2 years ago
- Public Repo for Atomic Test Harness☆251Updated 4 months ago
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆180Updated 2 years ago
- ☆194Updated 9 months ago
- Rules generated from our investigations.☆188Updated last week
- Collection of tools that reflect the network dimension into Bloodhound's data☆438Updated 2 years ago
- Threat Hunting tool about Sysmon and graphs☆329Updated last year
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆520Updated 2 months ago
- Blueteam operational triage registry hunting/forensic tool.☆142Updated last year
- Some Threat Hunting queries useful for blue teamers☆123Updated 2 years ago
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆678Updated last week
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆146Updated 2 years ago
- Sysmon EDR POC Build within Powershell to prove ability.☆218Updated 3 years ago
- ☆186Updated last week
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆219Updated 8 months ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆142Updated last year
- ☆130Updated 9 months ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆164Updated 2 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆448Updated 4 months ago
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆146Updated last year
- Set of SIGMA rules (>320) mapped to MITRE ATT&CK tactic and techniques☆306Updated 5 months ago
- Detection Ideas & Rules repository.☆178Updated 3 years ago
- ☆505Updated last month