CCXLabs / CCXDigger
The CyberCX Digger project is designed to help Australian organisations determine if they have been impacted by certain high profile cyber security incidents. Digger provides threat hunting functionality packaged in a simple-to-use tool, allowing users to detect certain attacker activities; all for free.
☆47Updated 4 years ago
Alternatives and similar repositories for CCXDigger:
Users that are interested in CCXDigger are comparing it to the libraries listed below
- Repository for SPEED SIEM Use Case Framework☆53Updated 4 years ago
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆37Updated 2 years ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆52Updated 2 years ago
- A community event for security researchers to share their favorite notebooks☆107Updated last year
- My Jupyter Notebooks☆36Updated 2 weeks ago
- Recon Hunt Queries☆76Updated 3 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- ☆28Updated 4 years ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆114Updated last year
- Cloud Templates and scripts to deploy mordor environments☆129Updated 4 years ago
- ☆6Updated 5 months ago
- ☆33Updated 5 months ago
- ☆42Updated 4 years ago
- Collection of useful, up to date, Carbon Black Response Queries☆83Updated 4 years ago
- Sigma Detection Rule Repository☆87Updated 4 years ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆108Updated 5 years ago
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆25Updated 10 months ago
- Resources for SANS CTI Summit 2021 presentation☆102Updated last year
- Convert Sigma rules to LogRhythm searches☆20Updated 3 years ago
- ☆93Updated 2 years ago
- The PoLRBear Project☆35Updated 4 years ago
- Detection of obfuscated Powershell commands☆54Updated last year
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆66Updated last year
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆80Updated last year
- Import specific data sources into the Sigma generic and open signature format.☆77Updated 2 years ago
- Corelight@Home script☆40Updated last year
- CSIRT Jump Bag☆26Updated 11 months ago
- Intrusion Detection Honeypots Book Code☆25Updated 4 years ago
- ☆32Updated 3 years ago
- Parses KAPE module files and downloads binaries referenced by BinaryURL☆18Updated 5 years ago