Intellisec-Solutions / Microsoft-Sentinel-SIGMA-Rules-Workbook
☆11Updated 2 years ago
Alternatives and similar repositories for Microsoft-Sentinel-SIGMA-Rules-Workbook:
Users that are interested in Microsoft-Sentinel-SIGMA-Rules-Workbook are comparing it to the libraries listed below
- This repository is used by FalconForce to release parts of the internal tools used for maintaining, validating and automatically deployin…☆15Updated 2 years ago
- ☆47Updated last week
- ☆21Updated 2 years ago
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆25Updated 5 months ago
- A collection of various SIEM rules relating to malware family groups.☆66Updated 10 months ago
- The ultimate repository for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆23Updated 2 weeks ago
- Sigma detection rules for hunting with the threathunting-keywords project☆55Updated last month
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆19Updated last year
- This is for my crappy (but hopefully useful) MDE and Sentinel KQL queries! #KQLThePlanet☆12Updated last month
- Cyber Defence related kusto queries for use in Azure Sentinel and Defender advanced hunting☆63Updated 3 weeks ago
- This repository contains sample log data that were collected after running adversary simulations in Microsoft 365☆20Updated 6 months ago
- ADXFlowmaster helps SecOps teams Threat Hunt suspicious network traffic inside & outside of Azure.☆36Updated 5 months ago
- ☆72Updated 6 months ago
- CarbonBlack EDR detection rules and response actions☆71Updated 7 months ago
- Generates a detailed CSV file containing Sigma Rules statistics for each service or category, and each level, offering a holistic view of…☆10Updated last year
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆37Updated last month
- Azure function to insert MISP data in to Azure Sentinel☆32Updated 2 years ago
- ☆21Updated 2 months ago
- SigmaHQ pySigma CrowdStrike processing pipeline☆24Updated 6 months ago
- Hunting Queries for Defender ATP☆81Updated last week
- A tool for fetching DFIR and other GitHub tools.☆23Updated 3 weeks ago
- Collection of scripts/resources/ideas for attack surface reduction and additional logging to enable better threat hunting on Windows endp…☆38Updated last year
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆77Updated 11 months ago
- A preconfigured Velociraptor triage collector☆51Updated this week
- A dataset containing Office 365 Unified Audit Logs for security research and detection☆52Updated 2 years ago
- Hunting Queries for Microsoft Defender Security Center https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defe…☆39Updated 4 years ago
- Library of threat hunts to get any user started!☆44Updated 4 years ago
- A high-speed forensic timeline creation tool for DFIR Investigators to quickly combine CSV files from EZ Tools/Kape, Axiom, Hayabusa, Cha…☆42Updated this week
- Tools and scripts to deploy and manage OpenRelik instances☆13Updated 2 months ago
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆27Updated 9 months ago