OTRF / OSSEM-DD
OSSEM Data Dictionaries
☆59Updated last week
Alternatives and similar repositories for OSSEM-DD:
Users that are interested in OSSEM-DD are comparing it to the libraries listed below
- OSSEM Detection Model☆174Updated 2 years ago
- Dettectinator - The Python library to your DeTT&CT YAML files.☆107Updated 2 weeks ago
- Full of public notes and Utilities☆95Updated 2 months ago
- ☆64Updated last week
- OSSEM Common Data Model☆55Updated 2 years ago
- A community event for security researchers to share their favorite notebooks☆107Updated 11 months ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆36Updated last year
- Detection Ideas & Rules repository.☆178Updated 3 years ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆65Updated 10 months ago
- Library of threat hunts to get any user started!☆41Updated 4 years ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆75Updated last year
- ☆85Updated 11 months ago
- YARA rule analyzer to improve rule quality and performance☆96Updated last month
- The Infosec Community Definitive Guide to Jupyter Notebooks☆121Updated 4 years ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆52Updated 2 years ago
- ☆4Updated 3 months ago
- A repository to share publicly available Velociraptor detection content☆124Updated this week
- SIEGMA - Transform Sigma rules into SIEM consumables☆146Updated last year
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆60Updated 9 months ago
- A repository of my own Sigma detection rules.☆157Updated 4 months ago
- Cloud Templates and scripts to deploy mordor environments☆128Updated 3 years ago
- My conference presentations☆66Updated last year
- Rules generated from our investigations.☆191Updated 3 months ago
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆131Updated 11 months ago
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆85Updated last year
- This code snippet retrieves Azure Sentinel rules that are mapped to MITRE ATT&CK Framework and generates the related MITRE D3FEND defense…☆70Updated 3 years ago
- Sigma rules to share with the community☆116Updated this week
- A CALDERA plugin☆74Updated 2 months ago
- pySigma Splunk backend☆35Updated last week
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆89Updated 2 years ago