Base4Security / T3SF
Technical Tabletop Exercises Simulation Framework
☆44Updated 10 months ago
Related projects: ⓘ
- Sigma detection rules for hunting with the threathunting-keywords project☆47Updated 3 weeks ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 2 years ago
- Slides of my public talks☆46Updated 9 months ago
- Sniffing out well-known threat groups☆28Updated last month
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆37Updated 4 months ago
- ☆17Updated this week
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆48Updated last year
- This Repository gives the best and possible strategies against hunting the ransomware☆24Updated 2 years ago
- ☆42Updated 3 months ago
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆34Updated 2 years ago
- A home for detection content developed by the delivr.to team☆56Updated 3 weeks ago
- The ultimate solution for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆21Updated last month
- ☆14Updated last year
- ☆40Updated 5 months ago
- A MITRE ATT&CK Lookup Tool☆41Updated 4 months ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆40Updated this week
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆57Updated last year
- Supporting material for my presentation "Adversarial Threat Modelling — A Practical Approach to Purple Teaming in the Enterprise"☆50Updated 2 years ago
- Baseline a Windows System against LOLBAS☆22Updated 4 months ago
- Library of threat hunts to get any user started!☆40Updated 4 years ago
- ReconPal: Leveraging NLP for Infosec☆54Updated 2 years ago
- ASR Configurator, Essentials and Atomic Testing☆32Updated last month
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆50Updated last month
- Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.☆15Updated 10 months ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆104Updated 2 years ago
- Threat Hunt Investigation Methodology and Procedure☆14Updated 2 years ago
- A collection of Sigma rules organized by MITRE ATT&CK technique☆15Updated 3 years ago
- Forensic Artifact Collection Tool Matrix☆70Updated 2 years ago
- Cyber Threats Detection Rules☆13Updated last week
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 4 months ago