Prepare, Hunt, and Respond - Conceptual model against cyber attacks by JYVSECTEC
☆62Jan 10, 2022Updated 4 years ago
Alternatives and similar repositories for PHR-model
Users that are interested in PHR-model are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Generic Signature Format for SIEM Systems☆18Jul 25, 2023Updated 2 years ago
- Atomic Red Team Simple Parser☆13Sep 21, 2018Updated 7 years ago
- A simple threaded Python script that returns the authentication methods supported by each of a list of SSH servers..☆12Jul 29, 2015Updated 10 years ago
- Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)☆10Oct 18, 2018Updated 7 years ago
- Plugin providing AF_XDP support for Bro.☆14May 10, 2021Updated 4 years ago
- Parser for Windows Scheduled Task files.☆13Apr 26, 2023Updated 2 years ago
- ☆19Aug 2, 2020Updated 5 years ago
- You can access the sigma rules to detect malicious activities. It is organized by Mitre Att&ck categories.☆13Feb 7, 2022Updated 4 years ago
- Security Monitoring Resolution Categories☆137Nov 25, 2021Updated 4 years ago
- Import AbuseCH IOC Feeds into MISP☆12Feb 17, 2021Updated 5 years ago
- Detecting ATT&CK techniques & tactics for Linux☆257Oct 1, 2020Updated 5 years ago
- Ansible Cobalt Strike (Docker)☆15Jan 8, 2022Updated 4 years ago
- another nmap summarising script☆26Oct 1, 2020Updated 5 years ago
- Some stuff for PHD2021☆14May 21, 2025Updated 10 months ago
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Sep 13, 2023Updated 2 years ago
- Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK☆1,080Nov 28, 2024Updated last year
- Actionable analytics designed to combat threats☆1,005May 25, 2022Updated 3 years ago
- Small Python-based web application honeypot with built-in analysis tools.☆12Sep 15, 2019Updated 6 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆108Feb 12, 2023Updated 3 years ago
- ☆349Mar 19, 2021Updated 5 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Jan 16, 2018Updated 8 years ago
- Repository for my talk on Desktop Bridge at Zer0Con 2018.☆34Mar 30, 2018Updated 7 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Nov 7, 2017Updated 8 years ago
- Elemental - An ATT&CK Threat Library☆318Dec 8, 2022Updated 3 years ago
- Methods of C2☆22Jul 15, 2015Updated 10 years ago
- Stand-alone parser for User Access Logging from Server 2012 and newer systems☆79Jan 9, 2024Updated 2 years ago
- A collection of awesome resources for Splunk Enterprise Security☆22Sep 11, 2020Updated 5 years ago
- attack2jira automates the process of standing up a Jira environment that can be used to track and measure ATT&CK coverage☆115Mar 26, 2023Updated 2 years ago
- Track progress and keep notes while working through likethecoins' CTI Self Study Plan☆29Aug 25, 2022Updated 3 years ago
- OpenVPN Connect for Windows (MSI) - 3.1.0.361 - Privilege Escalation☆26Feb 28, 2020Updated 6 years ago
- A repository of Sysmon For Linux configuration modules☆16Oct 14, 2021Updated 4 years ago
- ATT&CK Remote Threat Hunting Incident Response☆206Dec 8, 2024Updated last year
- A HTA shell to assist with breakout assessments.☆113Oct 20, 2021Updated 4 years ago
- Defence Against the Dark Arts☆34Sep 15, 2019Updated 6 years ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- ☆36Oct 5, 2016Updated 9 years ago
- Generate pentest reports based on github issues.☆15Dec 8, 2022Updated 3 years ago
- ☆26Sep 29, 2018Updated 7 years ago
- Short deep dive into Threat Hunting on AWS☆18Oct 15, 2023Updated 2 years ago