baronpan / SysmonHunter
An easy ATT&CK-based Sysmon hunting tool, showing in Blackhat USA 2019 Arsenal
☆201Updated 3 years ago
Alternatives and similar repositories for SysmonHunter:
Users that are interested in SysmonHunter are comparing it to the libraries listed below
- Explore Indicators of Compromise Automatically☆94Updated 5 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆101Updated 3 years ago
- Elemental - An ATT&CK Threat Library☆318Updated 2 years ago
- ☆164Updated 4 years ago
- Data from a BRAWL Automated Adversary Emulation Exercise☆205Updated 4 years ago
- Automated Tactics Techniques & Procedures☆253Updated last year
- Place for resources used during the Mordor Detection hackathon event featuring APT29 ATT&CK evals datasets☆137Updated 4 years ago
- Malware Sinkhole List in various formats☆103Updated 2 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆261Updated 6 years ago
- SysmonX - An Augmented Drop-In Replacement of Sysmon☆214Updated 5 years ago
- ☆53Updated 6 years ago
- Log newly created WMI consumers and processes to the Windows Application event log☆124Updated 7 years ago
- Mapping NSM rules to MITRE ATT&CK☆71Updated 4 years ago
- Test Blue Team detections without running any attack.☆272Updated 11 months ago
- Code and yara rules to detect and analyze Cobalt Strike☆265Updated 3 years ago
- Toolset for research malware and Cobalt Strike beacons☆210Updated last month
- PCAP Samples for Different Post Exploitation Techniques☆356Updated 3 years ago
- Historical list of {Cobalt Strike,NanoHTTPD} servers☆121Updated 5 years ago
- A PowerShell script to interact with the MITRE ATT&CK Framework via its own API☆367Updated 6 years ago
- A tool for de-obfuscating PowerShell scripts☆68Updated 5 years ago
- Simulating Adversary Operations☆93Updated 7 years ago
- Detecting ATT&CK techniques & tactics for Linux☆258Updated 4 years ago
- A Solution For Cross-Platform Obfuscated Commands Detection presented on CIS2019 China. 动静态Bash/CMD/PowerShell命令混淆检测框架 - CIS 2019大会☆164Updated 5 years ago
- ☆350Updated 4 years ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆85Updated 2 years ago
- How to Zeek Sysmon Logs!☆101Updated 3 years ago
- Cuckoo running in a nested hypervisor☆128Updated 4 years ago
- Searches For Threat Hunting and Security Analytics☆241Updated 3 weeks ago
- A lightweight tool to load Windows Event Log evtx files into Elasticsearch.☆115Updated 4 years ago
- Threat Report ATT&CK™ Mapping (TRAM) is a tool to aid analyst in mapping finished reports to ATT&CK.☆349Updated 3 years ago