Cyb3r-Monk / Cheat-Sheets
Cheat sheets for threat hunting, detection and other stuff.
☆33Updated 2 years ago
Alternatives and similar repositories for Cheat-Sheets:
Users that are interested in Cheat-Sheets are comparing it to the libraries listed below
- Sigma detection rules for hunting with the threathunting-keywords project☆55Updated last month
- ☆28Updated 4 years ago
- Library of threat hunts to get any user started!☆44Updated 4 years ago
- User Feedback Space of #MitreAssistant☆37Updated last year
- Track progress and keep notes while working through likethecoins' CTI Self Study Plan☆28Updated 2 years ago
- ☆21Updated 2 years ago
- ☆46Updated last month
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆63Updated 2 years ago
- List of custom developed KQL queries to help proactive security teams hunt for opportunistic and sophisticated threat activity by develop…☆26Updated 3 years ago
- ☆32Updated 3 years ago
- This repo is where I store my Threat Hunting ideas/content☆87Updated last year
- A MITRE ATT&CK Lookup Tool☆45Updated 11 months ago
- My Jupyter Notebooks☆36Updated last month
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- Random notes collected on the intertubes relating to DFIR☆32Updated last year
- Logbook for Digital Forensics and Incident Response☆50Updated 9 months ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆40Updated 11 months ago
- Threat Hunter's Knowledge Base☆22Updated 3 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆67Updated 3 weeks ago
- A collection of searches, interesting events and tables on Crowdstrike Splunk.☆29Updated 4 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆36Updated last year
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆44Updated 3 years ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆67Updated last year
- The ultimate repository for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆23Updated last week
- ☆21Updated 3 years ago
- A collection of Sigma rules organized by MITRE ATT&CK technique☆17Updated 3 years ago
- ☆27Updated 3 years ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆38Updated last year
- ☆87Updated last year
- Reference sheet for Threat Hunting Professional Course☆25Updated 6 years ago