CTI-Driven / Advanced-Threat-Hunting-Ransomware-Groups-AffiliatesLinks
Advanced Threat Hunting: Ransomware Group
☆29Updated 6 months ago
Alternatives and similar repositories for Advanced-Threat-Hunting-Ransomware-Groups-Affiliates
Users that are interested in Advanced-Threat-Hunting-Ransomware-Groups-Affiliates are comparing it to the libraries listed below
Sorting:
- MISP to Microsoft Defender integration☆15Updated last week
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆116Updated last year
- MISP to Sentinel integration☆79Updated last month
- A collection of various SIEM rules relating to malware family groups.☆70Updated last year
- Cyber Defence related kusto queries for use in Azure Sentinel and Defender advanced hunting☆67Updated last month
- Incident Response documents and tooling☆111Updated 3 weeks ago
- A preconfigured Velociraptor triage collector☆73Updated last week
- Detection rules and threat hunting queries in Defender XDR and Azure Sentinel☆15Updated 3 weeks ago
- Some important DFIR Resources☆84Updated 2 years ago
- Generates a detailed CSV file containing Sigma Rules statistics for each service or category, and each level, offering a holistic view of…☆10Updated 2 years ago
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆89Updated 11 months ago
- A repository of my own Sigma detection rules.☆163Updated last month
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆77Updated last year
- ☆96Updated last week
- ☆47Updated 3 years ago
- A dataset containing Office 365 Unified Audit Logs for security research and detection☆59Updated 3 years ago
- Config files for my GitHub profile.☆14Updated 2 years ago
- A repository to share publicly available Velociraptor detection content☆193Updated this week
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆125Updated 2 years ago
- Hunting Queries for Defender ATP☆82Updated last month
- SentinelOne STAR Rules☆71Updated 11 months ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆276Updated 9 months ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆114Updated last year
- This repository contains Splunk queries to hunt some anomalies☆46Updated 3 years ago
- CarbonBlack EDR detection rules and response actions☆73Updated last year
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆162Updated 9 months ago
- ☆54Updated last year
- The Threat Actor Profile Guide for CTI Analysts☆116Updated 2 years ago
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆294Updated this week
- User Feedback Space of #MitreAssistant☆38Updated 2 years ago