blacklanternsecurity / sigma-rules
A collection of Sigma rules organized by MITRE ATT&CK technique
☆16Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for sigma-rules
- Sigma detection rules for hunting with the threathunting-keywords project☆47Updated 2 weeks ago
- Library of threat hunts to get any user started!☆40Updated 4 years ago
- ☆25Updated 3 years ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆35Updated 11 months ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆44Updated 7 months ago
- Baseline a Windows System against LOLBAS☆25Updated 6 months ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 4 years ago
- Track progress and keep notes while working through likethecoins' CTI Self Study Plan☆28Updated 2 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆56Updated last week
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆50Updated last year
- ☆19Updated last year
- ☆28Updated 4 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆14Updated 4 years ago
- ESXi Cyber Security Incident Response Script☆20Updated 2 months ago
- A CALDERA plugin☆25Updated 3 months ago
- Cyber Threats Detection Rules☆13Updated 2 months ago
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- Cheat sheets for threat hunting, detection and other stuff.☆32Updated 2 years ago
- ☆43Updated last month
- This Repository gives the best and possible strategies against hunting the ransomware☆24Updated 2 years ago
- A MITRE ATT&CK Lookup Tool☆43Updated 6 months ago
- ShellSweeping the evil.☆52Updated 5 months ago
- The ultimate solution for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆22Updated 3 months ago
- Threat Hunter's Knowledge Base☆22Updated 2 years ago
- my MSTICpy practice and custom tools repository☆11Updated 2 weeks ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆35Updated last year
- ☆17Updated last year
- A home for detection content developed by the delivr.to team☆59Updated last week
- User Feedback Space of #MitreAssistant☆37Updated last year