OpenBAS-Platform / docker
OpenBAS Docker deployment helpers
☆18Updated last week
Alternatives and similar repositories for docker:
Users that are interested in docker are comparing it to the libraries listed below
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆47Updated 11 months ago
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆26Updated last week
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆79Updated last week
- Sigma detection rules for hunting with the threathunting-keywords project☆55Updated 3 weeks ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆71Updated 2 months ago
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆18Updated 5 months ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated 8 months ago
- User Feedback Space of #MitreAssistant☆37Updated last year
- ☆74Updated this week
- BlueBox Malware analysis Box and Cyber threat intelligence.☆40Updated 2 years ago
- ☆46Updated 3 weeks ago
- Baseline a Windows System against LOLBAS☆26Updated 11 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆85Updated 5 months ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆133Updated 2 years ago
- SigmaHQ pySigma CrowdStrike processing pipeline☆24Updated 5 months ago
- MS Graph Commands and Tools for Blue Teamers☆49Updated last year
- Advanced Threat Hunting: Ransomware Group☆20Updated 3 months ago
- Slides of my public talks☆54Updated last year
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 11 months ago
- A collection of various SIEM rules relating to malware family groups.☆65Updated 9 months ago
- A list of resources to build a information security team.☆13Updated 4 years ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆153Updated 10 months ago
- ☆19Updated 3 years ago
- Threat Simulator for Enterprise Networks☆14Updated 2 years ago
- The ultimate solution for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆22Updated 7 months ago
- CarbonBlack EDR detection rules and response actions☆71Updated 6 months ago
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆19Updated 3 months ago
- ReWrite of AChoir in Go for Cross Platform☆39Updated last month
- simple webapp for converting sigma rules into siem queries using the pySigma library☆47Updated last year
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated last year