CTI-Driven / Microsoft-ASR-to-MITRE-ATTACK-Mapping-Project
This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their corresponding ATT&CK techniques. The primary goal is to enhance the understanding of how ASR rules align with the ATT&CK framework.
☆23Updated 2 weeks ago
Related projects: ⓘ
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 4 months ago
- CarbonBlack EDR detection rules and response actions☆70Updated last week
- The ultimate solution for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆21Updated 3 weeks ago
- ☆42Updated 3 months ago
- ☆48Updated last year
- Slides of my public talks☆46Updated 9 months ago
- Sigma detection rules for hunting with the threathunting-keywords project☆47Updated 2 weeks ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆40Updated 5 months ago
- Hunting Queries for Defender ATP☆70Updated last week
- Collection of scripts/resources/ideas for attack surface reduction and additional logging to enable better threat hunting on Windows endp…☆38Updated 5 months ago
- A collection of various SIEM rules relating to malware family groups.☆60Updated 3 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆108Updated 5 months ago
- Cyber Defence related kusto queries for use in Azure Sentinel and Defender advanced hunting☆54Updated this week
- Presentations from Conferences☆25Updated this week
- Contains compiled binaries of Volatility☆28Updated 2 months ago
- Sentinel Logic Apps/Playbooks to automate enrichment, incident analysis and more.☆67Updated last month
- This Repository gives the best and possible strategies against hunting the ransomware☆24Updated 2 years ago
- ☆19Updated last year
- This repo is where I store my Threat Hunting ideas/content☆85Updated last year
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆75Updated 3 months ago
- M365/Azure adversary simulation tool designed to simulate adversary techniques and generate attack telemetry.☆110Updated 4 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆59Updated 2 months ago
- ☆13Updated last year
- SigmaHQ pySigma CrowdStrike processing pipeline☆18Updated this week
- ☆34Updated 6 months ago
- Test case indexes☆35Updated 2 months ago
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆23Updated 2 months ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆68Updated 9 months ago
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆99Updated 4 months ago
- ☆22Updated last year