A3sal0n / CyberThreatHunting
A collection of resources for Threat Hunters
☆870Updated 3 months ago
Alternatives and similar repositories for CyberThreatHunting:
Users that are interested in CyberThreatHunting are comparing it to the libraries listed below
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,140Updated last year
- Scripts and a (future) library to improve users' interactions with the ATT&CK content☆585Updated last year
- A curated list of awesome resources related to Mitre ATT&CK™ Framework☆591Updated 5 years ago
- Actionable analytics designed to combat threats☆977Updated 2 years ago
- Cyber Analytics Repository☆916Updated 9 months ago
- An informational repo about hunting for adversaries in your IT environment.☆1,734Updated 3 years ago
- Re-play Security Events☆1,618Updated 9 months ago
- ☆1,057Updated 5 years ago
- Detect Tactics, Techniques & Combat Threats☆2,091Updated last week
- A set of Zeek scripts to detect ATT&CK techniques.☆571Updated 6 months ago
- Extract and aggregate threat intelligence.☆840Updated 11 months ago
- Open Source Security Events Metadata (OSSEM)☆1,251Updated last year
- Tools, techniques, cheat sheets, and other resources to assist those defending organizations and detecting adversaries☆442Updated 2 years ago
- MISP trainings, threat intel and information sharing training materials with source code☆393Updated last month
- A curated list of the most important and useful resources about Threat Detection,Hunting and Intelligence.☆553Updated last year
- SIEM Tactics, Techiques, and Procedures☆602Updated last week
- Splunk Boss of the SOC version 2 dataset.☆362Updated 2 years ago
- Windows Events Attack Samples☆2,286Updated last year
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆778Updated last year
- A framework for developing alerting and detection strategies for incident response.☆709Updated 3 years ago
- DFIRTrack - The Incident Response Tracking Application☆487Updated 4 months ago
- A knowledge base of actionable Incident Response techniques☆626Updated 2 years ago
- A collection of sources of indicators of compromise.☆826Updated 3 months ago
- Python Script to access ATT&CK content available in STIX via a public TAXII server☆558Updated 3 weeks ago
- Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK☆1,063Updated last month
- Online hash checker for Virustotal and other services☆817Updated 8 months ago
- Incident Response Methodologies☆1,024Updated 6 years ago
- A repository of curated datasets from various attacks☆604Updated this week
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,253Updated 4 years ago