Kirtar22 / ThreatHunting_with_OsqueryLinks
Threat Hunting & Incident Investigation with Osquery
☆215Updated 3 years ago
Alternatives and similar repositories for ThreatHunting_with_Osquery
Users that are interested in ThreatHunting_with_Osquery are comparing it to the libraries listed below
Sorting:
- SIEGMA - Transform Sigma rules into SIEM consumables☆157Updated 9 months ago
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆245Updated 9 months ago
- Detection Ideas & Rules repository.☆178Updated 4 years ago
- ☆98Updated 3 years ago
- OSSEM Detection Model☆182Updated 3 years ago
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆189Updated 3 years ago
- Technical add-on for Splunk related to TheHive/Cortex from TheHive project☆53Updated 3 months ago
- Sigma Detection Rule Repository☆91Updated 5 years ago
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆141Updated last year
- A collection of Splunk's Search Processing Language (SPL) for Threat Hunting with CrowdStrike Falcon☆214Updated 5 years ago
- Dettectinator - The Python library to your DeTT&CT YAML files.☆119Updated 8 months ago
- A community event for security researchers to share their favorite notebooks☆109Updated last year
- Resources for SANS CTI Summit 2021 presentation☆104Updated 2 years ago
- Repository for SPEED SIEM Use Case Framework☆56Updated 5 years ago
- Resources To Learn And Understand SIGMA Rules☆182Updated 2 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆208Updated 3 years ago
- A python script developed to process Windows memory images based on triage type.☆265Updated 2 years ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆111Updated 5 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆115Updated 5 years ago
- SIGMA UI is a free open-source application based on the Elastic stack and Sigma Converter (sigmac)☆190Updated 4 years ago
- Sigma rules from Joe Security☆229Updated last year
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Updated 3 years ago
- A list of my personal projects☆177Updated 3 years ago
- ☆88Updated 9 months ago
- Cisco Orbital - Osquery queries by Talos☆136Updated last year
- Splunk code (SPL) for serious threat hunters and detection engineers.☆289Updated last year
- Rules generated from our investigations.☆203Updated 6 months ago
- A repository of my own Sigma detection rules.☆162Updated last month
- ☆13Updated last year
- Import specific data sources into the Sigma generic and open signature format.☆79Updated 3 years ago