PacktPublishing / Threat-Hunting-with-Elastic-Stack
Threat Hunting with Elastic Stack, Published by Packt
☆38Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Threat-Hunting-with-Elastic-Stack
- Incident Response with Threat Intelligence, published by Packt☆49Updated 7 months ago
- Some important DFIR Resources☆82Updated last year
- Cybersecurity Incident Response Plan☆87Updated 4 years ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆75Updated 11 months ago
- ☆54Updated 3 years ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆116Updated 11 months ago
- A collection of various SIEM rules relating to malware family groups.☆62Updated 5 months ago
- The Threat Actor Profile Guide for CTI Analysts☆97Updated last year
- This repository contains Splunk queries to hunt some anomalies☆38Updated 2 years ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆148Updated 6 months ago
- Intelligence Architecture Mind Map☆117Updated 8 months ago
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆71Updated 2 years ago
- ☆63Updated last year
- User Feedback Space of #MitreAssistant☆37Updated last year
- Practical Threat Detection Engineering, Published by Packt☆59Updated last year
- A repo to centralize some of the regular expressions I've found useful over the course of my DFIR career.☆84Updated last year
- ☆42Updated last year
- A repo hosting the Markua content for the EZ Tools manuals hosted on Leanpub☆63Updated last year
- Some Threat Hunting queries useful for blue teamers☆123Updated 2 years ago
- Config files for my GitHub profile.☆14Updated last year
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs☆51Updated last year
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆59Updated 10 months ago
- Cyber Underground General Intelligence Requirements☆89Updated 9 months ago
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆36Updated 3 years ago
- Tools for simulating threats☆177Updated last year
- Windows Malware Investigation Scripts & Docs☆75Updated last week
- An opensource sigma conversion tool built using pysigma☆100Updated this week
- DigitalShadows Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆35Updated 5 years ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆158Updated last week
- Harness the power of Splunk for your investigations☆77Updated this week