TactiKoolSec / OTHF
Open Threat Hunting Framework
☆108Updated last year
Alternatives and similar repositories for OTHF:
Users that are interested in OTHF are comparing it to the libraries listed below
- This repo is where I store my Threat Hunting ideas/content☆86Updated last year
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆75Updated 8 months ago
- Full of public notes and Utilities☆97Updated this week
- Repository of public reference frameworks for the DFIR community.☆115Updated last year
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆115Updated last year
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆111Updated last year
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆125Updated 9 months ago
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆94Updated last year
- BlackBerry Threat Research & Intelligence☆96Updated last year
- ☆86Updated last year
- Some Threat Hunting queries useful for blue teamers☆124Updated 2 years ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆145Updated 2 months ago
- Forensic Artifact Collection Tool Matrix☆81Updated 3 months ago
- The Github project for The Defender's Guide by Luke Paine and Jonathan Johnson☆147Updated last year
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆85Updated last year
- Active Directory Purple Team Playbook☆105Updated last year
- A repository of my own Sigma detection rules.☆157Updated 5 months ago
- Slides of my public talks☆54Updated last year
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆128Updated 2 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆200Updated 2 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆155Updated 2 years ago
- User Feedback Space of #MitreAssistant☆37Updated last year
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- Active C&C Detector☆152Updated last year
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆109Updated 2 months ago
- Repository resource for threat hunter☆158Updated 6 years ago
- CarbonBlack EDR detection rules and response actions☆71Updated 5 months ago
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆76Updated 3 months ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆59Updated this week
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆116Updated 6 months ago