OTRF / OSSEM-DD
OSSEM Data Dictionaries
☆59Updated last month
Alternatives and similar repositories for OSSEM-DD:
Users that are interested in OSSEM-DD are comparing it to the libraries listed below
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆37Updated last year
- Full of public notes and Utilities☆98Updated 2 weeks ago
- Dettectinator - The Python library to your DeTT&CT YAML files.☆108Updated last month
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆76Updated last year
- OSSEM Detection Model☆175Updated 2 years ago
- ☆86Updated last year
- ☆68Updated last week
- Detection of obfuscated Powershell commands☆54Updated last year
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆52Updated 2 years ago
- OSSEM Common Data Model☆55Updated 2 years ago
- A repository of my own Sigma detection rules.☆157Updated 5 months ago
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆86Updated last year
- ☆5Updated 4 months ago
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆76Updated 9 months ago
- YARA rule analyzer to improve rule quality and performance☆97Updated 2 months ago
- Convert Sigma rules to LogRhythm searches☆20Updated 3 years ago
- This repo is where I store my Threat Hunting ideas/content☆87Updated last year
- An opensource sigma conversion tool built using pysigma☆117Updated 2 months ago
- Library of threat hunts to get any user started!☆42Updated 4 years ago
- Anything Sysmon related from the MSTIC R&D team☆149Updated 8 months ago
- Detection Ideas & Rules repository.☆179Updated 3 years ago
- ☆58Updated 2 years ago
- Active Directory Purple Team Playbook☆105Updated last year
- Notes on managing and coordinating the response to major cyber incidents☆40Updated 4 years ago
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆132Updated last year
- Cloud Templates and scripts to deploy mordor environments☆129Updated 4 years ago
- ☆72Updated 4 months ago
- Sigma Detection Rule Repository☆87Updated 4 years ago
- A community event for security researchers to share their favorite notebooks☆107Updated last year
- SIEGMA - Transform Sigma rules into SIEM consumables☆146Updated last year