CCXLabs / CCXDiggerLinks
The CyberCX Digger project is designed to help Australian organisations determine if they have been impacted by certain high profile cyber security incidents. Digger provides threat hunting functionality packaged in a simple-to-use tool, allowing users to detect certain attacker activities; all for free.
☆45Updated 5 years ago
Alternatives and similar repositories for CCXDigger
Users that are interested in CCXDigger are comparing it to the libraries listed below
Sorting:
- A community event for security researchers to share their favorite notebooks☆109Updated last year
- Repository for SPEED SIEM Use Case Framework☆56Updated 5 years ago
- ☆88Updated 3 months ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆115Updated last year
- ☆35Updated last year
- Sigma Detection Rule Repository☆91Updated 5 years ago
- Recon Hunt Queries☆79Updated 4 years ago
- Detection Ideas & Rules repository.☆179Updated 4 years ago
- Resources for SANS CTI Summit 2021 presentation☆103Updated 2 years ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆111Updated 5 years ago
- Collection of useful, up to date, Carbon Black Response Queries☆84Updated 5 years ago
- Cloud Templates and scripts to deploy mordor environments☆129Updated 4 years ago
- Python library for threat intelligence☆90Updated 9 months ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆68Updated last year
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆54Updated 3 years ago
- ☆13Updated last year
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆45Updated 3 years ago
- Stand-alone parser for User Access Logging from Server 2012 and newer systems☆77Updated last year
- ☆42Updated 4 years ago
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆37Updated 3 years ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆85Updated last year
- A collection of tips for using MISP.☆74Updated 10 months ago
- BulkStrike enables the usage of CrowdStrike Real Time Response (RTR) to bulk execute commands on multiple machines.☆42Updated 2 years ago
- This is a set of tools for doing forensics analysis on Microsoft ESE databases.☆126Updated 3 years ago
- Import specific data sources into the Sigma generic and open signature format.☆78Updated 3 years ago
- ☆77Updated 6 years ago
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆21Updated 2 years ago
- My Jupyter Notebooks☆36Updated 7 months ago
- A collection of Terraform and Ansible scripts that automatically (and quickly) deploys a small Velociraptor R&D lab.☆21Updated 4 years ago
- Convert Sigma rules to LogRhythm searches☆22Updated 3 years ago