JMousqueton / CTI-MSTeams-Bot
🤖 Bot to get the last Cyber Security information in a Microsoft Teams channel 🏴☠️
☆44Updated this week
Alternatives and similar repositories for CTI-MSTeams-Bot
Users that are interested in CTI-MSTeams-Bot are comparing it to the libraries listed below
Sorting:
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆73Updated 3 weeks ago
- ☆19Updated 3 years ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆185Updated 4 months ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆98Updated 9 months ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆42Updated 3 years ago
- Track C2 servers, tools, and botnets over time by framework and location☆39Updated 3 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆120Updated 2 years ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆46Updated 2 months ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated 9 months ago
- This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malwar…☆30Updated last month
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆47Updated last year
- A collection of various SIEM rules relating to malware family groups.☆66Updated 10 months ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Updated 3 years ago
- ☆48Updated last week
- A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆23Updated 2 years ago
- Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.☆54Updated 4 months ago
- Useful PowerShell one-liner (and some two-liner) commands☆23Updated 2 years ago
- Assess Windows OS for security misconfigurations and hardening opportunities.☆31Updated 9 months ago
- CarbonBlack EDR detection rules and response actions☆71Updated 8 months ago
- yara detection rules for hunting with the threathunting-keywords project☆117Updated this week
- The Ransomware.live API Server is a Flask-based web application that provides endpoints to query and retrieve data related to ransomware …☆23Updated 6 months ago
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆63Updated last year
- Sigma detection rules for hunting with the threathunting-keywords project☆55Updated 2 months ago
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆22Updated 4 months ago
- This repository contains Splunk queries to hunt some anomalies☆42Updated 2 years ago
- Personal scripts☆14Updated 8 months ago
- Open IOC sharing platform☆56Updated 6 months ago
- Hunting Queries for Defender ATP☆81Updated last month
- Ransomware groups posts☆39Updated this week
- Some Threat Hunting queries useful for blue teamers☆126Updated 3 years ago