ahmedkhlief / APT-Hunter
APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the sea of windows event logs to decrease the time to uncover suspicious activity
☆1,305Updated 4 months ago
Alternatives and similar repositories for APT-Hunter:
Users that are interested in APT-Hunter are comparing it to the libraries listed below
- Open Source EDR for Windows☆1,197Updated 2 years ago
- Windows Events Attack Samples☆2,322Updated 2 years ago
- Defences against Cobalt Strike☆1,281Updated 2 years ago
- An Active Defense and EDR software to empower Blue Teams☆1,266Updated last year
- Invoke-AtomicRedTeam is a PowerShell module to execute tests as defined in the [atomics folder](https://github.com/redcanaryco/atomic-red…☆890Updated 3 weeks ago
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆704Updated last month
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,444Updated this week
- Automatically created C2 Feeds☆591Updated this week
- Detect Tactics, Techniques & Combat Threats☆2,126Updated last month
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,780Updated 2 weeks ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆844Updated 3 years ago
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆557Updated 2 months ago
- ☆514Updated 5 months ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,536Updated last year
- WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)☆780Updated 2 years ago
- Utilities for Sysmon☆1,509Updated 3 weeks ago
- Elastic Security detection content for Endpoint☆1,142Updated this week
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆1,836Updated last year
- A collection of red team and adversary emulation resources developed and released by MITRE.☆498Updated 3 years ago
- A repository of sysmon configuration modules☆2,743Updated 7 months ago
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,145Updated last year
- yarGen is a generator for YARA rules☆1,617Updated 9 months ago
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆892Updated last year
- TrustedSec Sysinternals Sysmon Community Guide☆1,198Updated 10 months ago
- Open Source Security Events Metadata (OSSEM)☆1,260Updated 2 years ago
- ☆2,255Updated last year
- Bloodhound Reporting for Blue and Purple Teams☆1,165Updated last month
- A curated list of awesome resources related to Mitre ATT&CK™ Framework☆595Updated 5 years ago
- YARA signature and IOC database for my scanners and tools☆2,576Updated this week
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆2,858Updated 9 months ago