CptOfEvilMinions / ChooseYourSIEMAdventureLinks
☆17Updated 3 years ago
Alternatives and similar repositories for ChooseYourSIEMAdventure
Users that are interested in ChooseYourSIEMAdventure are comparing it to the libraries listed below
Sorting:
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 7 months ago
- TheHiveIRPlaybook is a collection of TheHive case templates used for Incident Response☆13Updated 4 years ago
- AWS EKS Cluster Forensics☆23Updated 3 years ago
- ☆15Updated 5 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Updated 3 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated this week
- Workflows for Shuffle☆23Updated 2 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 3 years ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- Documentation used for Shuffle☆19Updated last week
- Converting data from services like Censys and Shodan to a common data model☆49Updated 8 months ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Updated 2 years ago
- ☆35Updated 4 years ago
- Build Automated Machine Images for MISP☆28Updated last year
- Osquery Packs we use for customer security hardening☆12Updated 8 months ago
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆22Updated 5 years ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆16Updated 4 years ago
- Example Suricata rules implementing some of my detection tactics☆20Updated 2 years ago
- ☆34Updated last year
- Open-source Fabric templates for cybersecurity and compliance☆20Updated 4 months ago
- DNS Dashboard for hunting and identifying beaconing☆16Updated 4 years ago
- Table Top Exercise (TTX) for Computer Security Incident Response (CSIRT) teams. The templatized artifacts provided will hopefully help te…☆37Updated 4 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆19Updated 3 years ago
- Simulates a compromise in a cloud and container environment☆32Updated 5 months ago
- Elasticsearch/Kibana environment and log data for Sigma workshop☆26Updated 5 years ago
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆26Updated 4 years ago
- Elastic TIP is a python tool which automates the process of aggregating Threat Intelligence and ingesting the intelligence into a common …☆27Updated 10 months ago