SecurityRiskAdvisors / dreddLinks
Automated detection rule analysis utility
☆29Updated 2 years ago
Alternatives and similar repositories for dredd
Users that are interested in dredd are comparing it to the libraries listed below
Sorting:
- Automatic detection engineering technical state compliance☆55Updated 11 months ago
- ☆42Updated last year
- Library of threat hunts to get any user started!☆44Updated 4 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- MITRE Shield website☆19Updated 3 years ago
- Cyber Threats Detection Rules☆14Updated last month
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆73Updated 3 years ago
- A list of Mitre Caldera compatible emulation-plans☆14Updated 4 years ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆38Updated last year
- Repository for SPEED SIEM Use Case Framework☆55Updated 5 years ago
- A collection of useful PowerShell tools to collect, organize, and visualize Sysmon event data☆39Updated 5 years ago
- ☆45Updated 2 years ago
- A repository of Sysmon For Linux configuration modules☆15Updated 3 years ago
- Import specific data sources into the Sigma generic and open signature format.☆78Updated 3 years ago
- ☆19Updated 4 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆68Updated last month
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆52Updated 2 years ago
- ☆27Updated 4 years ago
- Compilation of resources to help with Adversary Simulation automation harness☆100Updated 4 years ago
- Searches for Insider Threat Hunting☆32Updated 6 years ago
- OSSEM Modular☆27Updated 4 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 3 years ago
- The project was moved here https://github.com/atomic-threat-coverage/atomic-threat-coverage☆24Updated 5 years ago
- ShellSweeping the evil.☆52Updated last year
- YARA rule analyzer to improve rule quality and performance☆102Updated 2 months ago
- Threat Box Assessment Tool☆19Updated 3 years ago
- Sigma Detection Rule Repository☆88Updated 5 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆45Updated 3 years ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated last year