cybersheepdog / Threat-Hunting-MetricsLinks
Threat Hunting is time consuming enough as it is. Coming up with and tracking metrics to justify your hunt team to the Execs often takes time away from your Threat Hunting. I have created this Excel document to help automate as much of that as possible. The Strategic Overview tab is auto-updated based upon what you enter in the Threat Hunts Ta…
☆13Updated 3 years ago
Alternatives and similar repositories for Threat-Hunting-Metrics
Users that are interested in Threat-Hunting-Metrics are comparing it to the libraries listed below
Sorting:
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆97Updated 2 years ago
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆77Updated last year
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆89Updated 11 months ago
- ☆22Updated 3 years ago
- Detection Engineering with YARA☆86Updated 2 years ago
- Full of public notes and Utilities☆130Updated 3 weeks ago
- BlackBerry Threat Research & Intelligence☆100Updated 2 years ago
- A preconfigured Velociraptor triage collector☆73Updated 3 weeks ago
- Sigma detection rules for hunting with the threathunting-keywords project☆58Updated 10 months ago
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆90Updated 2 years ago
- ☆78Updated 4 months ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆127Updated 2 years ago
- Sigma rules to share with the community☆123Updated last year
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆115Updated last year
- Memory Baseliner is a script that can compare two windows memory images or perform frequency of occurrence / data stacking analysis on mu…☆55Updated 2 years ago
- A repository to share publicly available Velociraptor detection content☆194Updated last week
- Active C&C Detector☆155Updated 2 years ago
- The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the hos…☆32Updated 3 years ago
- ☆13Updated last year
- User Feedback Space of #MitreAssistant☆38Updated 2 years ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆126Updated last year
- ☆54Updated last year
- Jupyter notebooks for threat hunting☆60Updated 10 months ago
- The Threat Actor Profile Guide for CTI Analysts☆116Updated 2 years ago
- ☆68Updated 2 months ago
- macOS Artifacts☆33Updated 10 months ago
- CarbonBlack EDR detection rules and response actions☆73Updated last year
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆90Updated 2 months ago
- Forensics scripts aimed at automating & enhancing the Forensics Legend Eric Zimmerman's techniques, integrating the statistical detection…☆18Updated 2 years ago
- Open Threat Hunting Framework☆123Updated 2 years ago