CTI-Driven / Advanced-Threat-Hunting-Ransomware-Groups-AffiliatesLinks
Advanced Threat Hunting: Ransomware Group
☆28Updated last month
Alternatives and similar repositories for Advanced-Threat-Hunting-Ransomware-Groups-Affiliates
Users that are interested in Advanced-Threat-Hunting-Ransomware-Groups-Affiliates are comparing it to the libraries listed below
Sorting:
- A repository of my own Sigma detection rules.☆160Updated 11 months ago
- MISP to Sentinel integration☆71Updated last week
- Cyber Defence related kusto queries for use in Azure Sentinel and Defender advanced hunting☆65Updated 4 months ago
- SentinelOne STAR Rules☆67Updated 6 months ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆261Updated 5 months ago
- A collection of various SIEM rules relating to malware family groups.☆69Updated last year
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆103Updated 9 months ago
- Generates a detailed CSV file containing Sigma Rules statistics for each service or category, and each level, offering a holistic view of…☆10Updated last year
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆77Updated last year
- Some important DFIR Resources☆83Updated 2 years ago
- Config files for my GitHub profile.☆14Updated 2 years ago
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆271Updated last week
- Finding ClickFix and FakeCAPTCHA like it's 1999☆48Updated this week
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆113Updated 9 months ago
- A repository to share publicly available Velociraptor detection content☆187Updated last week
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆199Updated last year
- A preconfigured Velociraptor triage collector☆52Updated last week
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆86Updated 6 months ago
- Repository of attack and defensive information for Business Email Compromise investigations☆260Updated 3 months ago
- ☆52Updated last year
- Harness the power of Splunk for your investigations☆123Updated 2 months ago
- Repository of public reference frameworks for the DFIR community.☆117Updated 2 years ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆122Updated last year
- Incident Response documents and tooling☆75Updated last year
- KQLIntel is a browser-based tool that uses LLMs to convert threat intelligence reports into actionable Kusto Query Language (KQL) queries…☆20Updated 3 weeks ago
- Notes on responding to security breaches relating to Azure AD☆115Updated 3 years ago
- Hunting Queries for Defender ATP☆82Updated 4 months ago
- ☆28Updated 5 months ago
- The Threat Actor Profile Guide for CTI Analysts☆113Updated 2 years ago
- Online resources related to SOC Analysts. Incident investigation reference material, blogs, newsletters, good reads, books, trainings, po…☆24Updated last month