DefensiveOrigins / DO-LAB
☆43Updated last month
Related projects ⓘ
Alternatives and complementary repositories for DO-LAB
- The ultimate solution for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆22Updated 2 months ago
- ☆48Updated last year
- This repo is where I store my Threat Hunting ideas/content☆85Updated last year
- ☆40Updated 3 years ago
- Collection of scripts/resources/ideas for attack surface reduction and additional logging to enable better threat hunting on Windows endp…☆38Updated 7 months ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆35Updated 11 months ago
- Random tips and tricks RE: ransomware☆14Updated 3 years ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆44Updated 7 months ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆56Updated last week
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆125Updated 2 years ago
- This is for my crappy (but hopefully useful) MDE and Sentinel KQL queries! #KQLThePlanet☆10Updated last year
- ☆28Updated 4 years ago
- Baseline a Windows System against LOLBAS☆25Updated 6 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 6 months ago
- ☆40Updated last year
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆64Updated 2 years ago
- Sigma detection rules for hunting with the threathunting-keywords project☆47Updated 2 weeks ago
- Slides of my public talks☆46Updated 11 months ago
- M365/Azure adversary simulation tool designed to simulate adversary techniques and generate attack telemetry.☆112Updated this week
- Presentations from Conferences☆26Updated 2 months ago
- gundog - guided hunting in Microsoft Defender☆52Updated 3 years ago
- Community Tasks/Plans for PlumHound Queueing☆23Updated last year
- Conference presentations☆47Updated last year
- ☆19Updated last year
- Notes on responding to security breaches relating to Azure AD☆96Updated 2 years ago
- ☆70Updated last month
- This Repository gives the best and possible strategies against hunting the ransomware☆24Updated 2 years ago
- Hunting Queries for Defender ATP☆73Updated this week
- MDE relies on some of the Audit settings to be enabled☆97Updated 2 years ago
- An exercise to practice deobfuscating PowerShell Scripts.☆28Updated last year