ch33r10 / DEFCON29-BTV-ThreatReportRoulette
Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Threat Reports used in the making of this Panel.
☆15Updated last year
Alternatives and similar repositories for DEFCON29-BTV-ThreatReportRoulette:
Users that are interested in DEFCON29-BTV-ThreatReportRoulette are comparing it to the libraries listed below
- Cyber Threats Detection Rules☆14Updated 2 months ago
- My Jupyter Notebooks☆36Updated 11 months ago
- Threat Box Assessment Tool☆19Updated 3 years ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- Random tips and tricks RE: ransomware☆14Updated 3 years ago
- Library of threat hunts to get any user started!☆42Updated 4 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆44Updated 3 years ago
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆19Updated last year
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆67Updated this week
- Random notes collected on the intertubes relating to DFIR☆32Updated last year
- A completely unsupported set of scripts used in SANS FOR572, Advanced Network Forensics and Analysis☆26Updated 2 months ago
- Repository for SPEED SIEM Use Case Framework☆53Updated 4 years ago
- MITRE Shield website☆19Updated 3 years ago
- ☆9Updated 3 years ago
- ☆33Updated 4 months ago
- ☆20Updated 2 years ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆35Updated last week
- SigmaHQ pySigma CrowdStrike processing pipeline☆23Updated 4 months ago
- ☆15Updated 4 years ago
- A repo for centralizing ongoing research on the new Windows 10/11 DFIR artifact, EventTranscript.db.☆39Updated 2 years ago
- Recon Hunt Queries☆76Updated 3 years ago
- This repository contains sample log data that were collected after running adversary simulations in Microsoft 365☆20Updated 4 months ago
- Hunt malware with Volatility☆47Updated 9 months ago
- ☆28Updated 4 years ago
- Collection of scripts provided for public use☆34Updated this week
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆36Updated 2 years ago
- A collection of Terraform and Ansible scripts that automatically (and quickly) deploys a small Velociraptor R&D lab.☆20Updated 3 years ago
- Automated detection rule analysis utility☆29Updated 2 years ago
- A script to create and assign SOP tasks into the cases☆19Updated 4 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆24Updated 2 months ago