MII-Cybersec / Threat-Hunting-Notebook
Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes
☆19Updated 2 years ago
Alternatives and similar repositories for Threat-Hunting-Notebook:
Users that are interested in Threat-Hunting-Notebook are comparing it to the libraries listed below
- Library of threat hunts to get any user started!☆44Updated 4 years ago
- User Feedback Space of #MitreAssistant☆37Updated last year
- Threat Detection & Anomaly Detection rules for popular open-source components☆51Updated 2 years ago
- Cyber Threats Detection Rules☆14Updated 3 months ago
- A collection of tips for using MISP.☆74Updated 4 months ago
- Sigma detection rules for hunting with the threathunting-keywords project☆55Updated last month
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆35Updated 2 years ago
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆53Updated 2 years ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆67Updated last year
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆67Updated last week
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆28Updated this week
- Cheat sheets for threat hunting, detection and other stuff.☆33Updated 2 years ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆63Updated 2 years ago
- ☆21Updated 2 years ago
- This repo is where I store my Threat Hunting ideas/content☆87Updated last year
- Repository for SPEED SIEM Use Case Framework☆53Updated 4 years ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆118Updated last year
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆16Updated this week
- simple webapp for converting sigma rules into siem queries using the pySigma library☆47Updated last year
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆88Updated last year
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆44Updated 3 years ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆27Updated this week
- Searches for Insider Threat Hunting☆31Updated 5 years ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆37Updated last month
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆38Updated last year
- ☆11Updated last year
- A MITRE ATT&CK Lookup Tool☆45Updated last year
- ☆34Updated 6 months ago
- Import specific data sources into the Sigma generic and open signature format.☆78Updated 2 years ago
- Scripts and lists to help generate YARA friendly string mutations☆21Updated 2 years ago