Kathayra / threathuntingmaturitymodelLinks
Build your own threat hunting maturity model
☆11Updated 7 years ago
Alternatives and similar repositories for threathuntingmaturitymodel
Users that are interested in threathuntingmaturitymodel are comparing it to the libraries listed below
Sorting:
- Splunk app for Threat hunting☆15Updated 6 years ago
- Expert Investigation Guides☆51Updated 4 years ago
- Use DNS to hunt for threats including DGAs☆15Updated 9 years ago
- Integrating Sysinternals Autoruns’ logs into Security Onion☆31Updated last year
- This repository is created to add value to existing Network Security Monitoring solutions.☆43Updated 9 years ago
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Updated 7 years ago
- An informational repo about hunting for adversaries in your IT environment.☆14Updated 8 years ago
- automate your MISP installs☆68Updated 5 years ago
- Splunk App to assist Sysmon Threat Hunting☆38Updated 8 years ago
- ☆30Updated 6 years ago
- OSSEC Decoder & Rulesets for Sysmon Events☆15Updated 10 years ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆79Updated 3 years ago
- Powershell collection designed to assist in Threat Hunting Windows systems.☆27Updated 7 years ago
- ☆50Updated 5 years ago
- A few scripts I put together for testing purposes and to automate a few capabilities while doing IR. These scripts are also part of my bl…☆55Updated 7 years ago
- InvestigationPlaybookSpec☆72Updated 8 years ago
- Indices for courses in SANS' Network Security Operations curriculum☆16Updated 9 years ago
- PowerShell No Agent Hunting☆109Updated 7 years ago
- SEC599 supporting GitHub repository☆16Updated 6 years ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- Tools to search through massive amounts of data☆21Updated 10 months ago
- ☆39Updated 6 years ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆37Updated 2 years ago
- FRAC and RIFT☆17Updated 6 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- pocket guide for core threat hunting concepts☆23Updated 5 years ago
- Credential Phish Analysis and Automation☆97Updated 7 years ago
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆55Updated 4 years ago
- Miscelaneous Dockers☆47Updated 4 years ago
- Community Sharing Repository for Carbon Black and Bit9 Platforms☆27Updated 3 years ago