AdvancedThreatAnalytics / threat-analytics-searchLinks
Threat Analytics Search Chrome Extension
☆12Updated last year
Alternatives and similar repositories for threat-analytics-search
Users that are interested in threat-analytics-search are comparing it to the libraries listed below
Sorting:
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆43Updated last year
- ☆72Updated 7 months ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆133Updated 2 years ago
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- Web based S1 query navigator for one-click threat hunting☆19Updated 4 years ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆112Updated 6 months ago
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆26Updated last year
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆57Updated 3 years ago
- Powershell Scripts to work on Crowdstrike Falcon that pull back raw data relevant to forensic investigation☆22Updated 5 months ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆81Updated last year
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 7 months ago
- The idea is simply to save some quick notes that will make it easier for Splunk users to leverage KQL (Kusto), especially giving projects…☆43Updated 4 years ago
- ☆44Updated 2 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated 2 years ago
- Convert Sigma rules to LogRhythm searches☆21Updated 3 years ago
- ☆35Updated 4 years ago
- A PowerShell incident response script for quick triage☆80Updated 2 years ago
- My Jupyter Notebooks☆36Updated 2 months ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆53Updated 2 years ago
- Cybersecurity Incident Response Plan☆91Updated 4 years ago
- User Feedback Space of #MitreAssistant☆37Updated 2 years ago
- MISP to Sentinel integration☆67Updated last week
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs☆54Updated last year
- Azure function to insert MISP data in to Azure Sentinel☆32Updated 2 years ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆41Updated 3 weeks ago
- A collection of tips for using MISP.☆74Updated 5 months ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆114Updated last year
- ☆41Updated 2 years ago
- ☆26Updated 2 months ago
- A curated list of Awesome Threat Intelligence resources☆47Updated 6 years ago