CCXLabs / CCXDigger
The CyberCX Digger project is designed to help Australian organisations determine if they have been impacted by certain high profile cyber security incidents. Digger provides threat hunting functionality packaged in a simple-to-use tool, allowing users to detect certain attacker activities; all for free.
☆47Updated 4 years ago
Related projects: ⓘ
- A community event for security researchers to share their favorite notebooks☆105Updated 7 months ago
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆36Updated 2 years ago
- ☆84Updated 3 months ago
- Repository for SPEED SIEM Use Case Framework☆52Updated 4 years ago
- ☆41Updated 3 years ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆51Updated 2 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆44Updated 2 years ago
- My Jupyter Notebooks☆36Updated 5 months ago
- ☆84Updated 7 months ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆106Updated 4 years ago
- ☆83Updated 2 years ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆64Updated 6 months ago
- ☆28Updated last year
- Sigma Detection Rule Repository☆84Updated 4 years ago
- ☆76Updated 5 years ago
- A port of BHIS's Backdoors & Breaches for playingcards.io☆59Updated last year
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆24Updated 4 months ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆108Updated 9 months ago
- Cloud Templates and scripts to deploy mordor environments☆127Updated 3 years ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆23Updated 2 years ago
- Notes on managing and coordinating the response to major cyber incidents☆38Updated 4 years ago
- Collection of useful, up to date, Carbon Black Response Queries☆82Updated 3 years ago
- Python library for threat intelligence☆78Updated 2 months ago
- Convert Sigma rules to LogRhythm searches☆19Updated 2 years ago
- The PoLRBear Project☆35Updated 3 years ago
- ☆50Updated last year
- Microsoft Threat Protection Advance Hunting Cheat Sheet☆76Updated 4 years ago
- BulkStrike enables the usage of CrowdStrike Real Time Response (RTR) to bulk execute commands on multiple machines.☆41Updated last year
- ☆29Updated 2 years ago
- ☆28Updated 3 years ago