Cyb3rWard0g / Azure-Sentinel
☆12Updated this week
Related projects: ⓘ
- Tools for simulating threats☆170Updated 10 months ago
- Open-Source PowerShell module to allow online play of Backdoors & Breaches card game devised by Black Hills Information Security☆55Updated 3 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆66Updated last year
- A port of BHIS's Backdoors & Breaches for playingcards.io☆59Updated last year
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆122Updated last year
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆64Updated 4 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆108Updated 3 years ago
- Collection of walkthroughs on various threat hunting techniques☆73Updated 4 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Updated 2 years ago
- Repository of public reference frameworks for the DFIR community.☆105Updated last year
- Cybersecurity Incident Response Plan☆86Updated 3 years ago
- Zerofox Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆36Updated 4 years ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆49Updated 2 years ago
- an awesome list of active defense resources☆111Updated 4 years ago
- Full of public notes and Utilities☆81Updated 3 weeks ago
- Purple Teaming Attack & Hunt Lab - Terraform☆157Updated 2 years ago
- Collection of Jupyter Notebooks by @fr0gger_☆139Updated 2 weeks ago
- Resources To Learn And Understand SIGMA Rules☆163Updated last year
- Tools to automate and/or expedite response.☆113Updated 2 months ago
- Conference presentations☆45Updated 11 months ago
- This code snippet retrieves Azure Sentinel rules that are mapped to MITRE ATT&CK Framework and generates the related MITRE D3FEND defense…☆65Updated 3 years ago
- InsightVM helpful SQL queries☆57Updated 3 months ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆192Updated 2 years ago
- ☆113Updated 11 months ago
- Defensive Origins Training Schedule☆35Updated 9 months ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆51Updated 2 years ago
- Run Velociraptor on Security Onion☆34Updated 2 years ago
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs☆50Updated last year
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆119Updated this week
- ☆52Updated 3 years ago