Prepare, Hunt, and Respond - Conceptual model against cyber attacks by JYVSECTEC
☆62Jan 10, 2022Updated 4 years ago
Alternatives and similar repositories for PHR-model
Users that are interested in PHR-model are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Generic Signature Format for SIEM Systems☆18Jul 25, 2023Updated 2 years ago
- Atomic Red Team Simple Parser☆13Sep 21, 2018Updated 7 years ago
- Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)☆10Oct 18, 2018Updated 7 years ago
- Parser for Windows Scheduled Task files.☆13Apr 26, 2023Updated 2 years ago
- ☆19Aug 2, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- You can access the sigma rules to detect malicious activities. It is organized by Mitre Att&ck categories.☆13Feb 7, 2022Updated 4 years ago
- Security Monitoring Resolution Categories☆137Nov 25, 2021Updated 4 years ago
- Import AbuseCH IOC Feeds into MISP☆12Feb 17, 2021Updated 5 years ago
- Detecting ATT&CK techniques & tactics for Linux☆257Oct 1, 2020Updated 5 years ago
- Ansible Cobalt Strike (Docker)☆15Jan 8, 2022Updated 4 years ago
- another nmap summarising script☆26Oct 1, 2020Updated 5 years ago
- Some stuff for PHD2021☆14May 21, 2025Updated 10 months ago
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Sep 13, 2023Updated 2 years ago
- Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK☆1,081Nov 28, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Actionable analytics designed to combat threats☆1,006May 25, 2022Updated 3 years ago
- Small Python-based web application honeypot with built-in analysis tools.☆12Sep 15, 2019Updated 6 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆108Feb 12, 2023Updated 3 years ago
- ☆349Mar 19, 2021Updated 5 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Jan 16, 2018Updated 8 years ago
- Repository for my talk on Desktop Bridge at Zer0Con 2018.☆34Mar 30, 2018Updated 8 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Nov 7, 2017Updated 8 years ago
- Elemental - An ATT&CK Threat Library☆319Dec 8, 2022Updated 3 years ago
- Methods of C2☆22Jul 15, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Stand-alone parser for User Access Logging from Server 2012 and newer systems☆79Jan 9, 2024Updated 2 years ago
- attack2jira automates the process of standing up a Jira environment that can be used to track and measure ATT&CK coverage☆115Mar 26, 2023Updated 3 years ago
- Track progress and keep notes while working through likethecoins' CTI Self Study Plan☆29Aug 25, 2022Updated 3 years ago
- OpenVPN Connect for Windows (MSI) - 3.1.0.361 - Privilege Escalation☆26Feb 28, 2020Updated 6 years ago
- A repository of Sysmon For Linux configuration modules☆16Oct 14, 2021Updated 4 years ago
- ATT&CK Remote Threat Hunting Incident Response☆206Dec 8, 2024Updated last year
- A HTA shell to assist with breakout assessments.☆113Oct 20, 2021Updated 4 years ago
- Defence Against the Dark Arts☆34Sep 15, 2019Updated 6 years ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆36Oct 5, 2016Updated 9 years ago
- Generate pentest reports based on github issues.☆15Dec 8, 2022Updated 3 years ago
- ☆26Sep 29, 2018Updated 7 years ago
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- Log Entry to Sigma Rule Converter☆107Mar 3, 2022Updated 4 years ago
- A repo for security analytics & threat hunting resources☆21Sep 25, 2018Updated 7 years ago
- Communicate with a remote shell easily☆12Dec 10, 2017Updated 8 years ago