TracecatHQ / huntsLinks
๐ปโโ๏ธ ๐น Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.
โ11Updated last year
Alternatives and similar repositories for hunts
Users that are interested in hunts are comparing it to the libraries listed below
Sorting:
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.โ35Updated 2 years ago
- Open-source Fabric templates for cybersecurity and complianceโ20Updated 5 months ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.โ57Updated 3 years ago
- โ30Updated this week
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.โ29Updated last year
- Track progress and keep notes while working through likethecoins' CTI Self Study Planโ28Updated 2 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threaโฆโ18Updated 5 years ago
- Jupyter Univere is a search engine for all infosec jupyter notebooksโ26Updated 3 months ago
- Sharing Threat Hunting runbooksโ26Updated 5 years ago
- โ18Updated 3 years ago
- Workflows for Shuffleโ23Updated 2 years ago
- Repository that contains a set of purposefully erroneous Yara rules.โ51Updated last year
- โ11Updated 4 years ago
- ATT&CK Sync is a Center for Threat-Informed Defense project that aims to improve the ability for organizations to consume MITRE ATT&CKยฎ vโฆโ20Updated 3 weeks ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users inโฆโ30Updated 2 months ago
- Simulates a compromise in a cloud and container environmentโ32Updated 6 months ago
- Threat Detection & Anomaly Detection rules for popular open-source componentsโ52Updated 2 years ago
- Firepit - STIX Columnar Storageโ16Updated last year
- Osquery Packs we use for customer security hardeningโ12Updated 8 months ago
- A few quick recipes for those that do not have much time during the dayโ22Updated 7 months ago
- Library of threat hunts to get any user started!โ44Updated 4 years ago
- Automatic detection engineering technical state complianceโ55Updated 11 months ago
- Anvilogic Forgeโ104Updated 2 weeks ago
- [ARCHIVED -- USE TXT2DETECTION] A command line tool that converts Sigma Rules into STIX 2.1 Objects.โ10Updated 5 months ago
- Incident Response Report Using GitHub-Sphinxโ20Updated 5 years ago
- โ92Updated last month
- YARA, SIGMA, SNORT Rules based on Malware Analysisโ16Updated 2 months ago
- SIEM USE Case Selection Methodologyโ16Updated 4 years ago
- A script to create and assign SOP tasks into the casesโ20Updated 4 years ago
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.โ59Updated last week