brianreitz / awesome-blueteam
A list of resources to build a information security team.
☆13Updated 4 years ago
Alternatives and similar repositories for awesome-blueteam:
Users that are interested in awesome-blueteam are comparing it to the libraries listed below
- Collection of scripts/resources/ideas for attack surface reduction and additional logging to enable better threat hunting on Windows endp…☆38Updated 11 months ago
- A collection of various SIEM rules relating to malware family groups.☆65Updated 9 months ago
- ☆72Updated 5 months ago
- ☆46Updated 3 weeks ago
- Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations☆84Updated 8 months ago
- Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.☆52Updated 2 months ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆47Updated 11 months ago
- Sigma detection rules for hunting with the threathunting-keywords project☆55Updated last month
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆24Updated 4 months ago
- This repo is where I store my Threat Hunting ideas/content☆87Updated last year
- M365 Defender SOC Playbooks☆23Updated 2 years ago
- Slides of my public talks☆54Updated last year
- Hunting Queries for Defender ATP☆81Updated 2 weeks ago
- ☆41Updated last year
- Conference presentations☆47Updated last year
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs☆53Updated last year
- ASR Configurator, Essentials and Atomic Testing☆38Updated 5 months ago
- Security Scripts and Sources for daily usage.☆56Updated 2 weeks ago
- The ultimate solution for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆22Updated 7 months ago
- Collection of PowerShell functinos and scripts a Blue Teamer might use☆83Updated last year
- A curated list of awesome threat detection and hunting resources☆16Updated 6 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 3 years ago
- ☆61Updated last year
- Cyber Defence related kusto queries for use in Azure Sentinel and Defender advanced hunting☆63Updated this week
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 11 months ago
- Full of public notes and Utilities☆98Updated last month
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆23Updated 3 years ago
- CarbonBlack EDR detection rules and response actions☆71Updated 6 months ago
- Powershell script to build active directory forest and populate AD with random AD objects including AD users objects, computers objects, …☆33Updated 3 years ago
- User Feedback Space of #MitreAssistant☆37Updated last year