CptOfEvilMinions / ChooseYourSIEMAdventure
☆17Updated 3 years ago
Alternatives and similar repositories for ChooseYourSIEMAdventure:
Users that are interested in ChooseYourSIEMAdventure are comparing it to the libraries listed below
- Example Suricata rules implementing some of my detection tactics☆20Updated 2 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 2 months ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆53Updated 4 years ago
- ☆15Updated 5 years ago
- CyCAT.org API back-end server including crawlers☆30Updated last year
- Documentation used for Shuffle☆19Updated this week
- Automatic detection engineering technical state compliance☆53Updated 6 months ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆16Updated 4 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Updated 3 years ago
- Workflows for Shuffle☆21Updated 2 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Updated 2 years ago
- Learn about a network from a pcap file or reading from an interface☆28Updated 9 months ago
- Osquery Packs we use for customer security hardening☆12Updated 3 months ago
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆22Updated 5 years ago
- TheHiveIRPlaybook is a collection of TheHive case templates used for Incident Response☆13Updated 4 years ago
- A Spicy protocol analyzer for WireGuard☆29Updated 4 years ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆38Updated 3 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 4 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 3 years ago
- Recon Hunt Queries☆76Updated 3 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 3 years ago
- ☆34Updated last year
- Simulates a compromise in a cloud and container environment☆32Updated last month
- ☆12Updated 5 years ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆32Updated last month
- Converting data from services like Censys and Shodan to a common data model☆48Updated 4 months ago
- A Zeek package that detects Zoom logins and meeting joins☆12Updated 4 years ago
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆25Updated 4 years ago
- Incident Response Network Tools☆24Updated 3 years ago