ch33r10 / DEFCON29-BTV-ThreatReportRoulette
Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Threat Reports used in the making of this Panel.
☆15Updated last year
Alternatives and similar repositories for DEFCON29-BTV-ThreatReportRoulette:
Users that are interested in DEFCON29-BTV-ThreatReportRoulette are comparing it to the libraries listed below
- Random notes collected on the intertubes relating to DFIR☆32Updated last year
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- Cyber Threats Detection Rules☆14Updated last month
- A dataset containing Office 365 Unified Audit Logs for security research and detection☆49Updated 2 years ago
- Library of threat hunts to get any user started!☆41Updated 4 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆57Updated 2 weeks ago
- SigmaHQ pySigma CrowdStrike processing pipeline☆21Updated 3 months ago
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆36Updated 2 years ago
- simple webapp for converting sigma rules into siem queries using the pySigma library☆47Updated last year
- Repository for SPEED SIEM Use Case Framework☆52Updated 4 years ago
- Threat Box Assessment Tool☆19Updated 3 years ago
- Collection of scripts provided for public use☆34Updated 2 months ago
- Sigma detection rules for hunting with the threathunting-keywords project☆52Updated this week
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆36Updated last year
- ☆30Updated 3 years ago
- ☆20Updated 2 years ago
- This repository contains sample log data that were collected after running adversary simulations in Microsoft 365☆20Updated 3 months ago
- ☆28Updated 4 years ago
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆19Updated last year
- CSIRT Jump Bag☆27Updated 9 months ago
- Azure function to insert MISP data in to Azure Sentinel☆31Updated 2 years ago
- Recon Hunt Queries☆76Updated 3 years ago
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆75Updated 8 months ago
- MITRE Shield website☆18Updated 3 years ago
- Hunting Malicious Macros SANS Threathunting Summit 2021 Materials☆40Updated 3 years ago
- ☆15Updated 4 years ago
- ☆32Updated 3 months ago
- ☆4Updated 3 months ago
- Hunt malware with Volatility☆47Updated 8 months ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆35Updated last month