Lupovis / DetectingCanaryTokensLinks
A Red Team Script to Detect Canary Tokens and Seed Files
☆13Updated last year
Alternatives and similar repositories for DetectingCanaryTokens
Users that are interested in DetectingCanaryTokens are comparing it to the libraries listed below
Sorting:
- Import CrowdStrike Threat Intelligence into your instance of MISP☆47Updated last month
- A collection of tips for using MISP.☆74Updated 7 months ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 3 months ago
- Sigma detection rules for hunting with the threathunting-keywords project☆56Updated 4 months ago
- CarbonBlack EDR detection rules and response actions☆71Updated 10 months ago
- A collection of various SIEM rules relating to malware family groups.☆67Updated last year
- This repo is where I store my Threat Hunting ideas/content☆88Updated 2 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆98Updated 11 months ago
- Slides of my public talks☆56Updated last year
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Updated 4 years ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆110Updated 2 years ago
- Stand-Alone Windows Hardening (SAWH) is a script to reduce the attack surface of Windows systems that are not attached to a Windows Activ…☆53Updated 3 years ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆187Updated 7 months ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆49Updated last year
- ☆51Updated 3 years ago
- ☆71Updated 3 months ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆155Updated 3 months ago
- This repository contains Splunk queries to hunt some anomalies☆43Updated 2 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated 2 years ago
- A list of resources to build a information security team.☆13Updated 4 years ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆134Updated 2 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆42Updated 3 years ago
- God Mode Detection Rules☆134Updated 11 months ago
- Hunting Queries for Microsoft Defender Security Center https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defe…☆39Updated 4 years ago
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆117Updated 2 years ago
- ☆19Updated 3 years ago
- This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malwar…☆31Updated 3 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆124Updated last year
- Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.☆55Updated last month
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆31Updated 4 months ago