CyberConTraining / DDTTXLinks
DDTTX Tabletop Trainings
☆28Updated 3 years ago
Alternatives and similar repositories for DDTTX
Users that are interested in DDTTX are comparing it to the libraries listed below
Sorting:
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆115Updated 10 months ago
- A collection of Splunk's Search Processing Language (SPL) for Threat Hunting with CrowdStrike Falcon☆208Updated 5 years ago
- A port of BHIS's Backdoors & Breaches for playingcards.io☆64Updated 2 years ago
- This was code for analyzing round 1 of the MITRE Enterprise ATT&CK Evaluation. Please check out https://github.com/joshzelonis/Enterprise…☆95Updated 5 years ago
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆298Updated 10 months ago
- ATT&CK Remote Threat Hunting Incident Response☆203Updated 8 months ago
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆227Updated 4 months ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆71Updated 5 years ago
- Real-time Response scripts and schema☆116Updated last year
- The Infosec Community Definitive Guide to Jupyter Notebooks☆123Updated 4 years ago
- ☆72Updated 2 years ago
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆37Updated 3 years ago
- LogRhythm PowerShell Toolkit☆51Updated last month
- ☆77Updated last year
- Tools for simulating threats☆191Updated last year
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆135Updated 2 years ago
- ☆64Updated 2 years ago
- ☆26Updated 4 years ago
- The PoLRBear Project☆35Updated 4 years ago
- The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Of…☆261Updated 4 years ago
- Resources for SANS CTI Summit 2021 presentation☆103Updated last year
- SIEGMA - Transform Sigma rules into SIEM consumables☆154Updated 5 months ago
- ☆45Updated 2 years ago
- Creating a resource to help build and manage an Insider Threat program.☆71Updated 6 months ago
- This code snippet retrieves Azure Sentinel rules that are mapped to MITRE ATT&CK Framework and generates the related MITRE D3FEND defense…☆73Updated 4 years ago
- Atomic Purple Team Framework and Lifecycle☆299Updated 4 years ago
- ☆96Updated 2 years ago
- A Windows event logging and collection baseline focused on finding balance between forensic value and optimising retention.☆289Updated 3 years ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆83Updated last year
- Repository of SentinelOne Deep Visibility queries.☆130Updated 4 years ago