Neo23x0 / defensive-project-ideas
Ideas for projects for defensive research or blue teaming
☆10Updated 2 years ago
Alternatives and similar repositories for defensive-project-ideas:
Users that are interested in defensive-project-ideas are comparing it to the libraries listed below
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆27Updated 10 months ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated last year
- ShellSweeping the evil.☆52Updated 10 months ago
- Indicators of compromise from to analysis and research by Nextron Threat Research team☆10Updated 6 months ago
- ☆33Updated 3 years ago
- Linux #rootkit and #malware revealer☆24Updated 9 months ago
- Baseline a Windows System against LOLBAS☆26Updated last year
- Simple PowerShell script to enable process scanning with Yara.☆93Updated 2 years ago
- A simple tool designed to create Atomic Red Team tests with ease.☆40Updated last month
- Yara Rules for Modern Malware☆77Updated last year
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆77Updated last year
- Quick ESXi Log Parser☆19Updated 4 months ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Updated 2 years ago
- Repository that contains a set of purposefully erroneous Yara rules.☆51Updated last year
- Track progress and keep notes while working through likethecoins' CTI Self Study Plan☆28Updated 2 years ago
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Updated 2 years ago
- a tiny program to consume from ETW providers for research☆47Updated 4 months ago
- Repo containing my public talks☆23Updated last year
- Validates Sigma rules using the JSON schema☆16Updated last year
- Stupid Simple Detection Testing☆13Updated last year
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆33Updated last week
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- This repository contains sample log data that were collected after running adversary simulations in Microsoft 365☆20Updated 7 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 5 months ago
- Quickly search for references to a GUID in DLLs, EXEs, and drivers☆74Updated 3 years ago
- ☆16Updated last month
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated last year
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Updated last year
- A home for detection content developed by the delivr.to team☆69Updated 3 months ago