☆128Nov 22, 2023Updated 2 years ago
Alternatives and similar repositories for Content-Doc
Users that are interested in Content-Doc are comparing it to the libraries listed below
Sorting:
- ☆11Feb 9, 2023Updated 3 years ago
- ☆17Jul 17, 2024Updated last year
- Menu for Thor scanner lite☆20Oct 24, 2025Updated 4 months ago
- Knowledge base of analytics designed to cover threats based on MITRE's ATT&CK.☆23Dec 13, 2018Updated 7 years ago
- ☆22Jan 31, 2023Updated 3 years ago
- Collection of example YARA-L rules for use within Google Security Operations☆473Dec 5, 2025Updated 2 months ago
- ☆28Feb 11, 2026Updated 2 weeks ago
- ☆19Oct 23, 2020Updated 5 years ago
- Synopsis is a tool to aid analysts reviewing browser history files by providing a high-level “synopsis” of key information.☆22Oct 31, 2018Updated 7 years ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- Actionable analytics designed to combat threats☆1,005May 25, 2022Updated 3 years ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆60Mar 12, 2022Updated 3 years ago
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆68Apr 29, 2024Updated last year
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- Automated Real-Time Threat Hunting with ATD, Active Response and Elasticsearch/Kibana☆10Aug 17, 2018Updated 7 years ago
- ☆2,510Updated this week
- Splunk Security Content☆1,576Updated this week
- Reflex SOAR☆12Apr 1, 2022Updated 3 years ago
- Windows DPAPI laboratory☆12Mar 5, 2018Updated 7 years ago
- SIEM USE Case Selection Methodology☆17Sep 18, 2020Updated 5 years ago
- This repository contains advanced threat hunting scripts for Cisco Secure Endpoint API. The scripts leverage the AMP API to hunt for thre…☆14Jun 28, 2025Updated 8 months ago
- Sublime rules for email attack detection, prevention, and threat hunting.☆348Updated this week
- SIEGMA - Transform Sigma rules into SIEM consumables☆159Mar 10, 2025Updated 11 months ago
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆302Updated this week
- A simple Docker container that serves the MITRE ATT&CK Navigator web app☆27Apr 23, 2023Updated 2 years ago
- A hands-on workshop to learn how to do threat detection and response in AWS.☆11Sep 13, 2021Updated 4 years ago
- A collection of searches, interesting events and tables on Crowdstrike Splunk.☆30Mar 2, 2021Updated 5 years ago
- Open Source Security Events Metadata (OSSEM)☆1,288Feb 27, 2023Updated 3 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 5 months ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Feb 1, 2022Updated 4 years ago
- Dendogram visualization plugin for Kibana☆14Sep 19, 2017Updated 8 years ago
- Threat Detection System using Hybrid (Machine Learning + Lexical Analysis) learning Approach.☆11May 30, 2017Updated 8 years ago
- Philly Security Shell meetup demo and related files☆32Apr 15, 2019Updated 6 years ago
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆2,073May 28, 2025Updated 9 months ago
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆804Jan 14, 2026Updated last month
- Terraform modules for Sumo Logic resources☆16Updated this week
- Get notified on the addition or removal of roles and permissions in Microsoft Entra ID and Azure☆16Updated this week
- BasicEventViewer4 (BEV v4.0), this code will useful for All Blue/Purple Teams , RealTime Monitoring Sysmon Events , Mitre Attack Detectio…☆19Jun 22, 2023Updated 2 years ago