ConnectWise-Software / ConnectWise-CRULinks
ConnectWise-CRU
☆14Updated last year
Alternatives and similar repositories for ConnectWise-CRU
Users that are interested in ConnectWise-CRU are comparing it to the libraries listed below
Sorting:
- Splunk code (SPL) for serious threat hunters and detection engineers.☆289Updated 2 years ago
- ATT&CK Remote Threat Hunting Incident Response☆206Updated last year
- Windows Event Forwarding subscriptions, configuration files and scripts that assist with implementing ACSC's protect publication, Technic…☆227Updated last year
- EventList☆378Updated 4 years ago
- CASCADE Server☆274Updated 3 years ago
- Powershell Threat Hunting Module☆288Updated 9 years ago
- ☆128Updated 2 years ago
- A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework☆355Updated 5 years ago
- Mark Baggett's (@MarkBaggett - GSE #15, SANS SEC573 Author) tool for detecting randomness using NLP techniques rather than pure entropy c…☆129Updated 3 years ago
- ☆134Updated last year
- Building environments to replicate small networks and deploy applications☆331Updated 3 weeks ago
- ☆58Updated 4 months ago
- ☆225Updated 2 years ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆159Updated 10 months ago
- Incident Response Hierarchy of Needs☆470Updated 2 years ago
- Threat Report ATT&CK™ Mapping (TRAM) is a tool to aid analyst in mapping finished reports to ATT&CK.☆356Updated 4 years ago
- SIGMA UI is a free open-source application based on the Elastic stack and Sigma Converter (sigmac)☆189Updated 4 years ago
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.☆252Updated 4 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆115Updated 5 years ago
- This is a repository for freq.py and freq_server.py☆212Updated 5 years ago
- This was code for analyzing round 1 of the MITRE Enterprise ATT&CK Evaluation. Please check out https://github.com/joshzelonis/Enterprise…☆94Updated 5 years ago
- OSSEM Detection Model☆182Updated 3 years ago
- MITRE ATT&CK Windows Logging Cheat Sheets☆349Updated 7 years ago
- The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Of…☆277Updated 5 years ago
- Sigma rules from Joe Security☆230Updated last year
- Documentation of TheHive☆400Updated 2 years ago
- Pulls IOCs from MISP and adds the to reference sets in QRadar☆34Updated 2 years ago
- A collection of Splunk's Search Processing Language (SPL) for Threat Hunting with CrowdStrike Falcon☆214Updated 5 years ago
- LogRhythm PowerShell Toolkit☆53Updated last month
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆111Updated 5 years ago