OTRF / openhunt
☆33Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for openhunt
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆15Updated 3 years ago
- ☆12Updated 5 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆28Updated 6 years ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆76Updated 2 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 6 years ago
- pollen - A command-line tool for interacting with TheHive☆34Updated 5 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 5 years ago
- Threat Mapping Catalogue☆17Updated 3 years ago
- The Fastest way to consume Threat Intel☆25Updated 2 years ago
- A CALDERA plugin for ATT&CK Evaluations Round 1☆33Updated last year
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆37Updated last year
- ☆53Updated 5 years ago
- Expert Investigation Guides☆50Updated 3 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆19Updated 2 years ago
- Use DNS to hunt for threats including DGAs☆14Updated 8 years ago
- incident response scripts☆18Updated 5 years ago
- Zeek package to generate a SMB client fingerprint☆26Updated 4 years ago
- This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.☆33Updated 5 years ago
- pocket guide for core threat hunting concepts☆23Updated 4 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- Exports MISP events to STIX and ingest into McAfee ESM☆15Updated 4 years ago
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23Updated 2 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆22Updated 5 years ago
- ☆29Updated 6 years ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 5 years ago
- Cybersecurity Incidents Mind Maps☆32Updated 3 years ago
- Security Onion Elastic Stack☆46Updated 3 years ago
- Elasticsearch/Kibana environment and log data for Sigma workshop☆26Updated 4 years ago