DefensiveOrigins / DO-LAB
☆46Updated 3 weeks ago
Alternatives and similar repositories for DO-LAB:
Users that are interested in DO-LAB are comparing it to the libraries listed below
- The ultimate solution for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆22Updated 5 months ago
- ☆41Updated 3 years ago
- Collection of scripts/resources/ideas for attack surface reduction and additional logging to enable better threat hunting on Windows endp…☆38Updated 10 months ago
- Baseline a Windows System against LOLBAS☆25Updated 9 months ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆59Updated this week
- ☆41Updated last year
- Sigma detection rules for hunting with the threathunting-keywords project☆53Updated 3 weeks ago
- This repo is where I store my Threat Hunting ideas/content☆86Updated last year
- ☆28Updated 4 years ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 9 months ago
- ESXi Cyber Security Incident Response Script☆23Updated 5 months ago
- A preconfigured Windows-based system designed for rapid forensic investigations in both Azure and AWS.☆38Updated 10 months ago
- Slides of my public talks☆54Updated last year
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆128Updated 2 years ago
- This is for my crappy (but hopefully useful) MDE and Sentinel KQL queries! #KQLThePlanet☆10Updated last year
- A project that aims to automate Volatility3 at scale with the use of cloud strength and the power of KQL inside ADX.☆16Updated 2 months ago
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆24Updated 3 months ago
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆65Updated 3 years ago
- Random tips and tricks RE: ransomware☆14Updated 3 years ago
- Ingesting Shodan Monitor Alerts to Microsoft Sentinel☆34Updated last year
- Azure function to insert MISP data in to Azure Sentinel☆31Updated 2 years ago
- Open Threat-Informed Detection Engineering☆37Updated last month
- A tool to display Windows Event logs as they happen.☆12Updated last year
- A collection of various SIEM rules relating to malware family groups.☆65Updated 8 months ago
- ☆10Updated 2 years ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆65Updated 2 months ago
- MDE relies on some of the Audit settings to be enabled☆97Updated 2 years ago
- powershell script to simulate activity by a user☆21Updated 4 years ago
- The idea is simply to save some quick notes that will make it easier for Splunk users to leverage KQL (Kusto), especially giving projects…☆39Updated 4 years ago
- ☆72Updated 3 months ago