SekoiaLab / Fastir_Collector_LinuxLinks
☆176Updated 4 years ago
Alternatives and similar repositories for Fastir_Collector_Linux
Users that are interested in Fastir_Collector_Linux are comparing it to the libraries listed below
Sorting:
- A PowerShell script to interact with the MITRE ATT&CK Framework via its own API☆370Updated 6 years ago
- Detecting ATT&CK techniques & tactics for Linux☆257Updated 5 years ago
- Test Blue Team detections without running any attack.☆271Updated last year
- A modular Python application to collect intelligence for malicious hosts.☆271Updated 4 years ago
- ☆518Updated 4 years ago
- The Seeker of IOC☆131Updated 5 years ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆290Updated 8 years ago
- ☆206Updated 2 years ago
- Automated Tactics Techniques & Procedures☆259Updated 2 years ago
- Collecting & Hunting for IOCs with gusto and style☆241Updated 4 years ago
- Searches For Threat Hunting and Security Analytics☆237Updated 9 months ago
- Automated Use Case Testing☆171Updated 7 years ago
- How to Zeek Sysmon Logs!☆103Updated 3 years ago
- Vulnerability Data in ES☆143Updated 8 years ago
- 16,432 Free Yara rules created by☆391Updated 6 years ago
- Data from a BRAWL Automated Adversary Emulation Exercise☆211Updated 5 years ago
- Parse evtx files and detect use of the DanderSpritz eventlogedit module☆151Updated 8 years ago
- A PoC tool designed to enhance the effectiveness of your traps by spreading breadcrumbs & honeytokens across your systems to lure the att…☆277Updated 6 years ago
- TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs…☆156Updated 7 months ago
- A lightweight tool to load Windows Event Log evtx files into Elasticsearch.☆119Updated 5 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆552Updated 2 years ago
- Understanding ATT&CK Matrix for Enterprise☆79Updated 7 years ago
- Digital forensic acquisition tool for Windows based incident response.☆346Updated last year
- A little tool for detecting suspicious privileged NTLM connections, in particular Pass-The-Hash attack, based on event viewer logs.☆173Updated 10 months ago
- Detecting Lateral Movement with Machine Learning☆139Updated 8 years ago
- Threat Alert Logic Repository☆93Updated 6 years ago
- ☆280Updated 2 years ago
- Elemental - An ATT&CK Threat Library☆320Updated 3 years ago
- ☆348Updated 4 years ago
- Web interface for the Volatility Memory Forensics Framework☆260Updated 8 years ago