CptOfEvilMinions / BlogProjectsLinks
Various blog post projects.
☆25Updated 2 months ago
Alternatives and similar repositories for BlogProjects
Users that are interested in BlogProjects are comparing it to the libraries listed below
Sorting:
- Collection of Slides From My Conference Talks☆20Updated 3 years ago
- SIEM-From-Scratch is a drop-in ELK based SIEM component for your Vagrant infosec lab☆37Updated 5 years ago
- ☆34Updated 2 years ago
- Powershell / C# based cross platform forensic framework based for live incident response☆23Updated 5 years ago
- Hardens Windows Server to CIS Standards☆40Updated 6 years ago
- Tweettioc Splunk App☆20Updated 5 years ago
- A simple Docker container that serves the MITRE ATT&CK Navigator web app☆27Updated 2 years ago
- Cybersecurity Incidents Mind Maps☆34Updated 4 years ago
- Look into EDR events from network☆25Updated 2 months ago
- A library for fast parse & import of Windows Eventlogs into Elasticsearch.☆86Updated 7 months ago
- Use SQL to instantly query file, domain, URL and IP scanning results from VirusTotal.☆23Updated 3 months ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 4 years ago
- Automatic detection engineering technical state compliance☆55Updated last year
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Updated 4 years ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆94Updated 4 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Updated 8 years ago
- ☆53Updated 6 years ago
- THOR MITRE ATT&CK Framework Coverage☆25Updated 5 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 5 years ago
- Old home of LimaCharlie, open source EDR☆32Updated 2 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Updated 4 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 5 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Updated 5 years ago
- Example Suricata rules implementing some of my detection tactics☆22Updated 3 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago
- Generic Signature Format for SIEM Systems☆14Updated 4 years ago
- OSSEM Modular☆27Updated 5 years ago
- ☆71Updated 2 weeks ago
- Kerberoast Detection Script☆31Updated last year
- A tool to convert Windows evtx files (Windows Event Log Files) into JSON format and log to Splunk (optional) using HTTP Event Collector.☆58Updated 3 years ago