ch33r10 / DEFCON29-BTV-ThreatReportRoulette
Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Threat Reports used in the making of this Panel.
☆15Updated last year
Alternatives and similar repositories for DEFCON29-BTV-ThreatReportRoulette:
Users that are interested in DEFCON29-BTV-ThreatReportRoulette are comparing it to the libraries listed below
- Cyber Threats Detection Rules☆14Updated 3 months ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- ☆15Updated 4 years ago
- Repository for SPEED SIEM Use Case Framework☆53Updated 4 years ago
- Library of threat hunts to get any user started!☆43Updated 4 years ago
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆37Updated 3 years ago
- Random notes collected on the intertubes relating to DFIR☆32Updated last year
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆63Updated 2 years ago
- Automated detection rule analysis utility☆29Updated 2 years ago
- Threat Box Assessment Tool☆19Updated 3 years ago
- ☆34Updated 5 months ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆38Updated last year
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆67Updated last year
- SigmaHQ pySigma CrowdStrike processing pipeline☆24Updated 5 months ago
- Recon Hunt Queries☆76Updated 3 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆67Updated 2 weeks ago
- CSIRT Jump Bag☆26Updated 11 months ago
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆19Updated last year
- simple webapp for converting sigma rules into siem queries using the pySigma library☆47Updated last year
- my MSTICpy practice and custom tools repository☆11Updated 5 months ago
- Azure function to insert MISP data in to Azure Sentinel☆32Updated 2 years ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆37Updated 3 weeks ago
- My Jupyter Notebooks☆36Updated 3 weeks ago
- Collection of scripts provided for public use☆34Updated this week
- Searches for Insider Threat Hunting☆31Updated 5 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Updated 2 months ago
- Sigma detection rules for hunting with the threathunting-keywords project☆55Updated last month
- ☆21Updated 2 years ago
- A repo for centralizing ongoing research on the new Windows 10/11 DFIR artifact, EventTranscript.db.☆39Updated 2 years ago
- Logbook for Digital Forensics and Incident Response☆50Updated 8 months ago