ahmedkhlief / APT-Hunter
APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the sea of windows event logs to decrease the time to uncover suspicious activity
☆1,298Updated 3 months ago
Alternatives and similar repositories for APT-Hunter:
Users that are interested in APT-Hunter are comparing it to the libraries listed below
- Windows Events Attack Samples☆2,307Updated 2 years ago
- Defences against Cobalt Strike☆1,284Updated 2 years ago
- An Active Defense and EDR software to empower Blue Teams☆1,255Updated last year
- Open Source EDR for Windows☆1,182Updated last year
- Invoke-AtomicRedTeam is a PowerShell module to execute tests as defined in the [atomics folder](https://github.com/redcanaryco/atomic-red…☆881Updated this week
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,429Updated 2 weeks ago
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆700Updated 2 weeks ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,520Updated last year
- ☆514Updated 4 months ago
- Automatically created C2 Feeds☆584Updated this week
- Detect Tactics, Techniques & Combat Threats☆2,116Updated 3 weeks ago
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆792Updated last year
- ☆535Updated last year
- yarGen is a generator for YARA rules☆1,602Updated 8 months ago
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,144Updated last year
- Sophos-originated indicators-of-compromise from published reports☆565Updated 2 weeks ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆841Updated 3 years ago
- ☆1,044Updated last year
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆2,830Updated 8 months ago
- A collection of red team and adversary emulation resources developed and released by MITRE.☆498Updated 3 years ago
- YARA signature and IOC database for my scanners and tools☆2,554Updated this week
- A repository of sysmon configuration modules☆2,724Updated 6 months ago
- ☆2,234Updated last year
- Interesting APT Report Collection And Some Special IOC☆2,498Updated this week
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆550Updated last month
- RegRipper3.0☆577Updated 2 months ago
- Re-play Security Events☆1,621Updated 11 months ago
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,762Updated last week
- A set of Zeek scripts to detect ATT&CK techniques.☆576Updated 7 months ago
- Elastic Security detection content for Endpoint☆1,117Updated last week