Knowledge base of analytics designed to cover threats based on MITRE's ATT&CK.
☆23Dec 13, 2018Updated 7 years ago
Alternatives and similar repositories for atomic-threat-coverage
Users that are interested in atomic-threat-coverage are comparing it to the libraries listed below
Sorting:
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Recipes for GCHQ's CyberChef Web App☆39Nov 15, 2018Updated 7 years ago
- A curated list of awesome YARA rules, tools, and people.☆33Oct 26, 2023Updated 2 years ago
- A collection of typical false positive indicators☆56Dec 5, 2020Updated 5 years ago
- Log Entry to Sigma Rule Converter☆107Mar 3, 2022Updated 4 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆46Nov 1, 2021Updated 4 years ago
- Automated Real-Time Threat Hunting with ATD, Active Response and Elasticsearch/Kibana☆10Aug 17, 2018Updated 7 years ago
- SIEM USE Case Selection Methodology☆17Sep 18, 2020Updated 5 years ago
- Command Line STDOUT Colorer☆30Jul 27, 2021Updated 4 years ago
- Repo for hugo generated files☆13Feb 4, 2026Updated last month
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆12May 29, 2017Updated 8 years ago
- An Inofficial Sysmon Version History (Change Log)☆33Oct 25, 2020Updated 5 years ago
- Invisible Watermarks with Space Characters in ASCII Files☆21Jun 14, 2018Updated 7 years ago
- incident response scripts☆18Mar 4, 2019Updated 7 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Apr 16, 2021Updated 4 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆23Oct 1, 2016Updated 9 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Jul 27, 2022Updated 3 years ago
- ☆19Oct 23, 2020Updated 5 years ago
- Scripts useful in cracking the Vulnhub Lab named View2aKill: 1☆26Feb 1, 2020Updated 6 years ago
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Sep 23, 2020Updated 5 years ago
- SigmaHQ pySigma CrowdStrike processing pipeline☆28Nov 30, 2025Updated 3 months ago
- Bash scripting tutorial☆24Dec 1, 2018Updated 7 years ago
- Notes only☆19May 2, 2022Updated 3 years ago
- ☆24Mar 19, 2020Updated 5 years ago
- Awesome VirusTotal Intelligence Search Queries☆332May 16, 2023Updated 2 years ago
- ☆11Sep 26, 2021Updated 4 years ago
- THOR MITRE ATT&CK Framework Coverage☆25Jun 15, 2020Updated 5 years ago
- CRL Monitor - X.509 Certificate Revocation List monitoring and X.509/Subject caching☆35Apr 16, 2021Updated 4 years ago
- Powershell collection designed to assist in Threat Hunting Windows systems.☆27Apr 13, 2018Updated 7 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Jun 23, 2018Updated 7 years ago
- Collection of Praetorian solutions to CTF challenges☆25Apr 20, 2018Updated 7 years ago
- CRUD básico em PHP com um sistema de cadastro de clientes.☆13May 19, 2021Updated 4 years ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆33Jul 23, 2024Updated last year
- Online diary is a PHP app by which you can write your feeling and keep it private or share with people and you can also read other post o…☆10Jul 5, 2015Updated 10 years ago
- ☆10Apr 20, 2022Updated 3 years ago
- Lite version of PDF X-RAY that uses no backend☆38Nov 11, 2011Updated 14 years ago
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆39Dec 17, 2025Updated 2 months ago