CTI-Driven / Advanced-Threat-Hunting-Ransomware-Groups-AffiliatesLinks
Advanced Threat Hunting: Ransomware Group
☆29Updated 4 months ago
Alternatives and similar repositories for Advanced-Threat-Hunting-Ransomware-Groups-Affiliates
Users that are interested in Advanced-Threat-Hunting-Ransomware-Groups-Affiliates are comparing it to the libraries listed below
Sorting:
- Cyber Defence related kusto queries for use in Azure Sentinel and Defender advanced hunting☆66Updated 2 weeks ago
- A collection of various SIEM rules relating to malware family groups.☆70Updated last year
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆114Updated last year
- Incident Response documents and tooling☆109Updated 2 months ago
- MISP to Sentinel integration☆76Updated 2 weeks ago
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆88Updated 9 months ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆125Updated last year
- Config files for my GitHub profile.☆14Updated 2 years ago
- A repository of my own Sigma detection rules.☆162Updated last year
- Some important DFIR Resources☆83Updated 2 years ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆114Updated 11 months ago
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆77Updated last year
- Generates a detailed CSV file containing Sigma Rules statistics for each service or category, and each level, offering a holistic view of…☆10Updated last year
- Hunting Queries for Defender ATP☆82Updated this week
- ☆95Updated 3 months ago
- A repository to share publicly available Velociraptor detection content☆190Updated this week
- ☆45Updated 3 years ago
- A preconfigured Velociraptor triage collector☆56Updated last week
- SentinelOne STAR Rules☆69Updated 9 months ago
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆83Updated 3 years ago
- A dataset containing Office 365 Unified Audit Logs for security research and detection☆58Updated 3 years ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆199Updated last year
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆270Updated 7 months ago
- Content Repo for Demystifying KQL Tutorial Series☆71Updated last year
- SigmaHQ pySigma CrowdStrike processing pipeline☆26Updated 3 months ago
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆284Updated last week
- ☆104Updated 4 months ago
- The Threat Actor Profile Guide for CTI Analysts☆115Updated 2 years ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆52Updated last year
- CarbonBlack EDR detection rules and response actions☆73Updated last year