JPMinty / MindMapsLinks
Collection of created MindMaps
☆150Updated last year
Alternatives and similar repositories for MindMaps
Users that are interested in MindMaps are comparing it to the libraries listed below
Sorting:
- Misc Threat Hunting Resources☆373Updated 2 years ago
- Mindmaps for threat hunting - work in progress.☆150Updated 3 years ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 3 months ago
- Cloud Templates and scripts to deploy mordor environments☆129Updated 4 years ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆161Updated 7 months ago
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆186Updated 3 years ago
- Build a attack range in your local machine☆131Updated 2 years ago
- Learning by Practising - Hack & Detect - A Practical Guide to Hacking and its Detection via network forensics☆78Updated last year
- Purple Teaming Attack & Hunt Lab - Terraform☆159Updated 3 years ago
- ThreatHunt is a PowerShell repository that allows you to train your threat hunting skills.☆135Updated 5 years ago
- Threat-Intelligence Feeds & Tools & Frameworks☆219Updated last year
- Detection Ideas & Rules repository.☆179Updated 3 years ago
- Collecting & Hunting for IOCs with gusto and style☆241Updated 3 years ago
- Open Threat Hunting Framework☆117Updated 2 years ago
- Active Directory Purple Team Playbook☆110Updated 2 years ago
- ☆116Updated last year
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- Resources for SANS CTI Summit 2021 presentation☆103Updated last year
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆87Updated 2 years ago
- Blueteam operational triage registry hunting/forensic tool.☆148Updated 2 years ago
- ATTPwn☆214Updated last year
- This repo is where I store my Threat Hunting ideas/content☆88Updated 2 years ago
- Repository resource for threat hunter☆158Updated 6 years ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆134Updated 2 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆68Updated 2 months ago
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆154Updated 3 years ago
- My conference presentations☆66Updated last year
- ☆77Updated 4 years ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆114Updated last year
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆110Updated 5 years ago