ahmedkhlief / APT-HunterLinks
APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the sea of windows event logs to decrease the time to uncover suspicious activity
☆1,392Updated last year
Alternatives and similar repositories for APT-Hunter
Users that are interested in APT-Hunter are comparing it to the libraries listed below
Sorting:
- Open Source EDR for Windows☆1,280Updated 2 years ago
- Defences against Cobalt Strike☆1,294Updated 3 years ago
- An Active Defense and EDR software to empower Blue Teams☆1,311Updated 2 years ago
- Invoke-AtomicRedTeam is a PowerShell module to execute tests as defined in the [atomics folder](https://github.com/redcanaryco/atomic-red…☆985Updated 2 months ago
- Elastic Security detection content for Endpoint☆1,336Updated last week
- Windows Events Attack Samples☆2,462Updated 2 years ago
- ☆555Updated last year
- Automatically created C2 Feeds☆654Updated this week
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆756Updated 7 months ago
- ☆1,117Updated last year
- Sophos-originated indicators-of-compromise from published reports☆636Updated 3 months ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆859Updated 3 years ago
- Utilities for Sysmon☆1,561Updated 2 months ago
- ☆513Updated last year
- WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)☆781Updated 2 years ago
- Scan files or process memory for CobaltStrike beacons and parse their configuration☆919Updated 4 years ago
- A collection of red team and adversary emulation resources developed and released by MITRE.☆524Updated 4 years ago
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆598Updated 10 months ago
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆949Updated 2 years ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,687Updated 2 months ago
- Utilities for MITRE™ ATT&CK☆1,044Updated 2 months ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,017Updated last month
- Interesting APT Report Collection And Some Special IOCs☆2,749Updated last week
- Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.☆957Updated 3 months ago
- Detect Tactics, Techniques & Combat Threats☆2,231Updated last month
- Guidance for mitigation web shells. #nsacyber☆982Updated 2 years ago
- TrustedSec Sysinternals Sysmon Community Guide☆1,303Updated this week
- Ransomware simulator written in Golang☆454Updated 3 years ago
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,860Updated last week
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,171Updated 2 years ago