CTI-Driven / Advanced-Threat-Hunting-Ransomware-Groups-AffiliatesLinks
Advanced Threat Hunting: Ransomware Group
☆29Updated 4 months ago
Alternatives and similar repositories for Advanced-Threat-Hunting-Ransomware-Groups-Affiliates
Users that are interested in Advanced-Threat-Hunting-Ransomware-Groups-Affiliates are comparing it to the libraries listed below
Sorting:
- A collection of various SIEM rules relating to malware family groups.☆70Updated last year
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆114Updated last year
- Cyber Defence related kusto queries for use in Azure Sentinel and Defender advanced hunting☆66Updated last month
- Incident Response documents and tooling☆110Updated 3 months ago
- MISP to Sentinel integration☆77Updated this week
- A preconfigured Velociraptor triage collector☆70Updated 2 weeks ago
- Generates a detailed CSV file containing Sigma Rules statistics for each service or category, and each level, offering a holistic view of…☆10Updated last year
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆114Updated last year
- Hunting Queries for Defender ATP☆82Updated 3 weeks ago
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆88Updated 9 months ago
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆77Updated last year
- Detection rules and threat hunting queries in Defender XDR and Azure Sentinel☆15Updated last month
- Config files for my GitHub profile.☆14Updated 2 years ago
- Some important DFIR Resources☆84Updated 2 years ago
- A repository of my own Sigma detection rules.☆162Updated last week
- ☆47Updated 3 years ago
- A repository to share publicly available Velociraptor detection content☆191Updated last week
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆125Updated 2 years ago
- ☆96Updated last week
- SentinelOne STAR Rules☆69Updated 9 months ago
- CarbonBlack EDR detection rules and response actions☆73Updated last year
- Online resources related to SOC Analysts. Incident investigation reference material, blogs, newsletters, good reads, books, trainings, po…☆28Updated 4 months ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆159Updated 8 months ago
- Sigma detection rules for hunting with the threathunting-keywords project☆56Updated 9 months ago
- User Feedback Space of #MitreAssistant☆38Updated 2 years ago
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs☆54Updated 2 years ago
- ☆53Updated last year
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆291Updated this week
- Content Repo for Demystifying KQL Tutorial Series☆71Updated last year
- ☆105Updated 5 months ago