ConnectWise-Software / ConnectWise-CRULinks
ConnectWise-CRU
☆14Updated last year
Alternatives and similar repositories for ConnectWise-CRU
Users that are interested in ConnectWise-CRU are comparing it to the libraries listed below
Sorting:
- ATT&CK Remote Threat Hunting Incident Response☆204Updated 10 months ago
- Splunk code (SPL) for serious threat hunters and detection engineers.☆287Updated last year
- Windows Event Forwarding subscriptions, configuration files and scripts that assist with implementing ACSC's protect publication, Technic…☆226Updated 8 months ago
- Powershell Threat Hunting Module☆285Updated 9 years ago
- EventList☆377Updated 4 years ago
- A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework☆351Updated 4 years ago
- CASCADE Server☆272Updated 2 years ago
- Building environments to replicate small networks and deploy applications☆327Updated 9 months ago
- Incident Response Hierarchy of Needs☆465Updated 2 years ago
- ☆128Updated last year
- SIEGMA - Transform Sigma rules into SIEM consumables☆157Updated 7 months ago
- LogRhythm PowerShell Toolkit☆51Updated 2 months ago
- A collection of Splunk's Search Processing Language (SPL) for Threat Hunting with CrowdStrike Falcon☆212Updated 5 years ago
- Threat Report ATT&CK™ Mapping (TRAM) is a tool to aid analyst in mapping finished reports to ATT&CK.☆353Updated 4 years ago
- OSSEM Detection Model☆180Updated 3 years ago
- SIGMA UI is a free open-source application based on the Elastic stack and Sigma Converter (sigmac)☆189Updated 4 years ago
- The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Of…☆264Updated 4 years ago
- ☆133Updated last year
- Phantom Community Playbooks☆515Updated 2 weeks ago
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆299Updated this week
- ☆58Updated last month
- Data from a BRAWL Automated Adversary Emulation Exercise☆210Updated 5 years ago
- Mark Baggett's (@MarkBaggett - GSE #15, SANS SEC573 Author) tool for detecting randomness using NLP techniques rather than pure entropy c…☆128Updated 3 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆113Updated 5 years ago
- MITRE ATT&CK Windows Logging Cheat Sheets☆345Updated 6 years ago
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆238Updated 7 months ago
- Investigate suspicious activity by visualizing Sysmon's event log☆425Updated last year
- A collection of PowerShell modules designed for artifact gathering and reconnaisance of Windows-based endpoints.☆472Updated 11 months ago
- This content is analysis and research of the data sources currently listed in ATT&CK.☆411Updated 2 years ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆110Updated 5 years ago