cudeso / misp2defenderLinks
MISP to Microsoft Defender integration
☆15Updated this week
Alternatives and similar repositories for misp2defender
Users that are interested in misp2defender are comparing it to the libraries listed below
Sorting:
- Advanced Threat Hunting: Ransomware Group☆29Updated 6 months ago
- MISP to Sentinel integration☆79Updated last month
- SentinelOne STAR Rules☆70Updated 11 months ago
- Menu for Thor scanner lite☆20Updated 2 months ago
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆89Updated 11 months ago
- A preconfigured Velociraptor triage collector☆74Updated last week
- Cyber Defence related kusto queries for use in Azure Sentinel and Defender advanced hunting☆67Updated last month
- Pipeline that allows sending forensic artifacts to OpenRelik for automatic processing☆37Updated last month
- A repository to share publicly available Velociraptor detection content☆190Updated last week
- A collection of various SIEM rules relating to malware family groups.☆70Updated last year
- Generates a detailed CSV file containing Sigma Rules statistics for each service or category, and each level, offering a holistic view of…☆10Updated 2 years ago
- Repository where I hold random detection and threat hunting queries that I come up with based on different sources of information (or eve…☆275Updated 3 weeks ago
- MAES: M365 Analyzer & Extractor Suite Po☆33Updated last week
- A repository of my own Sigma detection rules.☆163Updated last month
- MISP Playbooks☆222Updated 2 months ago
- ☆96Updated last month
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆77Updated last year
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆116Updated last year
- Scripts for rapid Windows endpoint "tactical triage" and investigations with Velociraptor and KAPE☆176Updated 2 weeks ago
- KQLIntel is a browser-based tool that uses LLMs to convert threat intelligence reports into actionable Kusto Query Language (KQL) queries…☆27Updated 5 months ago
- ☆105Updated 6 months ago
- Config files for my GitHub profile.☆14Updated 2 years ago
- ☆53Updated last year
- A 30-day hands-on SOC Analyst project simulating real-world cyber attacks using ELK Stack, Mythic C2, osTicket & Elastic Defend. Covers t…☆39Updated 7 months ago
- Harness the power of Splunk for your investigations☆147Updated 3 months ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆276Updated 9 months ago
- Some important DFIR Resources☆84Updated 2 years ago
- Security Scripts and Sources for daily usage.☆70Updated 2 weeks ago
- Hunting Queries for Defender ATP☆82Updated 3 weeks ago
- An automated deployment tool that creates instrumented Azure environments with vulnerable systems for simulating attacks and testing Micr…☆60Updated 5 months ago