Security-Experts-Community / ERMACK
Enterprise Response Model & Common Knowledge
☆36Updated 10 months ago
Alternatives and similar repositories for ERMACK:
Users that are interested in ERMACK are comparing it to the libraries listed below
- реп полезностей для PT MaxPatrol SIEM☆24Updated last year
- Chrome extension for SOC automations☆34Updated last month
- Открытый репозиторий с правилами на языке eXtraction and Processing (XP)☆20Updated last month
- MP SIEM SDK☆25Updated 2 months ago
- A free data collection and YARA scanning tool for cybersecurity incident investigation, compromise assessment and threat hunting☆15Updated 5 months ago
- System of Orchestration, Lifecycle control, Detection and Response☆58Updated last year
- ☆65Updated 3 years ago
- Convert Sigma rules to Wazuh rules☆64Updated last year
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆164Updated last year
- MISP Playbooks☆197Updated 2 months ago
- Extensible framework for analyzing publicly available information about vulnerabilities☆112Updated 3 weeks ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆153Updated 5 months ago
- BlackBerry Threat Research & Intelligence☆98Updated last year
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆132Updated last year
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆83Updated last year
- SIEGMA - Transform Sigma rules into SIEM consumables☆149Updated last month
- Forensic Artifact Collection Tool Matrix☆83Updated 5 months ago
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆151Updated 3 years ago
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆184Updated 2 years ago
- Repository of public reference frameworks for the DFIR community.☆116Updated last year
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆150Updated 2 months ago
- A repository with data about APTs☆12Updated 2 years ago
- ☆68Updated 2 months ago
- Rules generated from our investigations.☆194Updated 3 weeks ago
- Harness the power of Splunk for your investigations☆99Updated 3 weeks ago
- Blueteam operational triage registry hunting/forensic tool.☆145Updated last year
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆201Updated 2 years ago
- LOKI2 - Simple IOC and YARA Scanner☆92Updated 8 months ago
- Powershell module for VMWare vSphere forensics☆150Updated 5 months ago
- CarbonBlack EDR detection rules and response actions☆71Updated 7 months ago