Neo23x0 / atomic-threat-coverage
Knowledge base of analytics designed to cover threats based on MITRE's ATT&CK.
☆22Updated 6 years ago
Alternatives and similar repositories for atomic-threat-coverage:
Users that are interested in atomic-threat-coverage are comparing it to the libraries listed below
- Some YARA rules i will add from time to time☆12Updated 5 years ago
- Recipes for GCHQ's CyberChef Web App☆35Updated 6 years ago
- Site for IWS book content☆18Updated 6 years ago
- Collection of scripts used to analyse malware or emails☆19Updated 4 years ago
- Information about most important hunts which can be performed by Threat hunters while searching for any adversary/threats inside the orga…☆15Updated 5 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 2 months ago
- ☆29Updated 6 years ago
- Use DNS to hunt for threats including DGAs☆14Updated 9 years ago
- A collection of typical false positive indicators☆55Updated 4 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Updated 4 years ago
- incident response scripts☆19Updated 5 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 5 years ago
- ☆12Updated 5 years ago
- A simple many-rules to many-files YARA scanner for incident response or malware zoos.☆26Updated 6 years ago
- Build your own threat hunting maturity model☆11Updated 7 years ago
- PowerShell Memory Pulling script☆19Updated 9 years ago
- Searches for Insider Threat Hunting☆30Updated 5 years ago
- Expert Investigation Guides☆51Updated 3 years ago
- ☆14Updated 4 years ago
- ☆11Updated 4 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Presentation Slides and Video links☆31Updated 3 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Quick script to build host or investigation timelines using Carbon Black Response☆12Updated 6 years ago
- Mass Triage Tools☆20Updated 6 months ago
- pocket guide for core threat hunting concepts☆23Updated 4 years ago