DefensiveOrigins / DO-LABLinks
☆47Updated last month
Alternatives and similar repositories for DO-LAB
Users that are interested in DO-LAB are comparing it to the libraries listed below
Sorting:
- This repo is where I store my Threat Hunting ideas/content☆87Updated 2 years ago
- The ultimate repository for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆24Updated last week
- Sigma detection rules for hunting with the threathunting-keywords project☆55Updated 3 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆82Updated last year
- A preconfigured Windows-based system designed for rapid forensic investigations in both Azure and AWS.☆39Updated last year
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆26Updated 6 months ago
- This repository is used by FalconForce to release parts of the internal tools used for maintaining, validating and automatically deployin…☆17Updated 2 years ago
- Baseline a Windows System against LOLBAS☆27Updated last year
- ☆29Updated 4 years ago
- Collection of scripts/resources/ideas for attack surface reduction and additional logging to enable better threat hunting on Windows endp…☆38Updated last year
- ASR Configurator, Essentials and Atomic Testing☆42Updated last month
- ☆42Updated 4 years ago
- Hunting Queries for Microsoft Defender Security Center https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defe…☆39Updated 4 years ago
- Community Tasks/Plans for PlumHound Queueing☆23Updated 2 years ago
- A collection of various SIEM rules relating to malware family groups.☆66Updated 11 months ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆38Updated last year
- ☆33Updated last year
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆68Updated 3 weeks ago
- Slides of my public talks☆55Updated last year
- ESXi Cyber Security Incident Response Script☆22Updated 9 months ago
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago
- This Repository gives the best and possible strategies against hunting the ransomware☆26Updated 2 years ago
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆65Updated 3 years ago
- ☆41Updated 2 years ago
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆27Updated 11 months ago
- Jupyter notebooks☆25Updated 4 years ago
- Bloodhound Portable for Windows☆51Updated 2 years ago
- Random tips and tricks RE: ransomware☆14Updated 3 years ago
- powershell script to simulate activity by a user☆21Updated 4 years ago
- Presentations☆17Updated 2 years ago