chrivand / twitter_search_threatresponseLinks
Twitter Search to Cisco Threat Response Casebook [v1.0]
☆15Updated 2 years ago
Alternatives and similar repositories for twitter_search_threatresponse
Users that are interested in twitter_search_threatresponse are comparing it to the libraries listed below
Sorting:
- Public script from SANS FOR509 Enterprise Cloud Incident Response☆209Updated last month
- Repository of SentinelOne Deep Visibility queries.☆133Updated 4 years ago
- A collection of Splunk's Search Processing Language (SPL) for Threat Hunting with CrowdStrike Falcon☆211Updated 5 years ago
- The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Of…☆261Updated 4 years ago
- Tools for simulating threats☆193Updated last year
- Cyber Incident Response Team Playbook Battle Cards☆417Updated last year
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆266Updated 6 months ago
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆276Updated this week
- Splunk code (SPL) for serious threat hunters and detection engineers.☆287Updated last year
- ☆65Updated 2 years ago
- A list of Splunk queries that I've collected and used over time.☆86Updated 4 years ago
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆233Updated 6 months ago
- Repository of attack and defensive information for Business Email Compromise investigations☆262Updated 5 months ago
- LogRhythm PowerShell Toolkit☆51Updated last month
- Real-time Response scripts and schema☆118Updated last year
- Rules generated from our investigations.☆201Updated 3 months ago
- SentinelOne STAR Rules☆69Updated 7 months ago
- Repository of public reference frameworks for the DFIR community.☆119Updated 2 years ago
- An opensource sigma conversion tool built using pysigma☆139Updated last month
- OSSEM Detection Model☆179Updated 2 years ago
- This repository contains Community and Field contributed content for LogScale☆276Updated 2 weeks ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆156Updated 7 months ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆114Updated 10 months ago
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆138Updated last year
- ☆45Updated 2 years ago
- A repository of my own Sigma detection rules.☆162Updated last year
- ☆13Updated 11 months ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆198Updated last year
- PowerShell module for Office 365 and Azure log collection☆275Updated 2 weeks ago
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆81Updated 3 years ago