SophosRapidResponse / OSQuery
☆80Updated last month
Related projects ⓘ
Alternatives and complementary repositories for OSQuery
- ☆52Updated last year
- Real-time Response scripts and schema☆104Updated 11 months ago
- ☆85Updated 2 years ago
- Dettectinator - The Python library to your DeTT&CT YAML files.☆104Updated this week
- Repository of SentinelOne Deep Visibility queries.☆118Updated 3 years ago
- A collection of Splunk's Search Processing Language (SPL) for Threat Hunting with CrowdStrike Falcon☆191Updated 4 years ago
- ☆75Updated last week
- ☆41Updated 2 years ago
- MISP to Sentinel integration☆58Updated last week
- SentinelOne STAR Rules☆50Updated 11 months ago
- A collection of various SIEM rules relating to malware family groups.☆61Updated 4 months ago
- ☆70Updated 2 weeks ago
- ☆1Updated 2 weeks ago
- A repository to share publicly available Velociraptor detection content☆119Updated this week
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆75Updated 5 months ago
- Tools for simulating threats☆174Updated last year
- 2021 SANS DFIR Summit: Greppin' Logs☆21Updated 3 years ago
- Notes on responding to security breaches relating to Azure AD☆96Updated 2 years ago
- Repository of attack and defensive information for Business Email Compromise investigations☆228Updated 2 months ago
- Cybersecurity Incident Response Plan☆87Updated 4 years ago
- Convert Sigma rules to LogRhythm searches☆19Updated 2 years ago
- BulkStrike enables the usage of CrowdStrike Real Time Response (RTR) to bulk execute commands on multiple machines.☆41Updated last year
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆124Updated 2 years ago
- ☆26Updated 3 years ago
- A repository of my own Sigma detection rules.☆156Updated 2 months ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆141Updated last year
- A PowerShell incident response script for quick triage☆75Updated 2 years ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆116Updated 11 months ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆97Updated 8 months ago