PacktPublishing / Threat-Hunting-with-Elastic-StackLinks
Threat Hunting with Elastic Stack, Published by Packt
☆39Updated 2 years ago
Alternatives and similar repositories for Threat-Hunting-with-Elastic-Stack
Users that are interested in Threat-Hunting-with-Elastic-Stack are comparing it to the libraries listed below
Sorting:
- Incident Response with Threat Intelligence, published by Packt☆56Updated last year
- The Infosec Community Definitive Guide to Jupyter Notebooks☆130Updated 5 years ago
- Practical Threat Detection Engineering, Published by Packt☆80Updated 2 years ago
- Jupyter notebooks for threat hunting☆60Updated 9 months ago
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆85Updated 3 years ago
- Tools for simulating threats☆199Updated 2 years ago
- Cybersecurity Incident Response Plan☆109Updated 5 years ago
- Automating Security Detection Engineering, published by Packt☆65Updated last year
- Some important DFIR Resources☆84Updated 2 years ago
- ☆63Updated 3 years ago
- MISP Playbooks☆222Updated 2 months ago
- Intelligence Architecture Mind Map☆139Updated last year
- Repository resource for threat hunter☆158Updated 7 years ago
- Repository of public reference frameworks for the DFIR community.☆120Updated 2 years ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆173Updated last year
- Conference presentations☆60Updated 2 months ago
- A collection of various SIEM rules relating to malware family groups.☆70Updated last year
- Dictionary of CTI-related acronyms, terms, and jargon☆145Updated last month
- A curated list of KAPE-related resources☆177Updated 7 months ago
- Incident Response documents and tooling☆111Updated this week
- Collection of PowerShell functinos and scripts a Blue Teamer might use☆89Updated 2 years ago
- ☆47Updated 3 years ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆60Updated 3 years ago
- Repository for Cortex XDR and Cortex XSIAM XQL queries and more!☆38Updated last year
- ☆64Updated 4 years ago
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆119Updated 6 months ago
- Resources To Learn And Understand SIGMA Rules☆182Updated 2 years ago
- Some Threat Hunting queries useful for blue teamers☆131Updated 3 years ago
- Collection of Jupyter Notebooks by @fr0gger_☆188Updated last week
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆49Updated last year