cybersheepdog / Threat-Hunting-Metrics
Threat Hunting is time consuming enough as it is. Coming up with and tracking metrics to justify your hunt team to the Execs often takes time away from your Threat Hunting. I have created this Excel document to help automate as much of that as possible. The Strategic Overview tab is auto-updated based upon what you enter in the Threat Hunts Ta…
☆11Updated 2 years ago
Alternatives and similar repositories for Threat-Hunting-Metrics
Users that are interested in Threat-Hunting-Metrics are comparing it to the libraries listed below
Sorting:
- Sigma detection rules for hunting with the threathunting-keywords project☆55Updated 2 months ago
- VelociraptorMCP is a Model Context Protocol bridge for exposing LLMs to MCP clients.☆25Updated last week
- The core backend server handling API requests and task management☆39Updated this week
- Tools and scripts to deploy and manage OpenRelik instances☆13Updated 2 months ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆51Updated 6 months ago
- ☆21Updated 2 years ago
- Baseline a Windows System against LOLBAS☆26Updated last year
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆33Updated 2 weeks ago
- Remote access and Antivirus Logging Database☆42Updated last year
- A preconfigured Velociraptor triage collector☆51Updated this week
- ☆11Updated last year
- Collection of scripts/resources/ideas for attack surface reduction and additional logging to enable better threat hunting on Windows endp…☆38Updated last year
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆84Updated 3 months ago
- Jupyter notebooks for threat hunting☆56Updated last month
- simple webapp for converting sigma rules into siem queries using the pySigma library☆48Updated last year
- A home for detection content developed by the delivr.to team☆69Updated 3 months ago
- ☆47Updated last month
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆19Updated last year
- Quick ESXi Log Parser☆19Updated 4 months ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆39Updated this week
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (EXT4, XFS) journals (not systemd-journald), generates…☆64Updated last month
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.☆42Updated 3 weeks ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆78Updated last year
- ☆68Updated 5 months ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated last year
- Memory Baseliner is a script that can compare two windows memory images or perform frequency of occurrence / data stacking analysis on mu…☆53Updated last year
- Powershell sandboxing utility☆18Updated 2 weeks ago
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆34Updated 3 years ago
- Slides of my public talks☆55Updated last year
- ☆7Updated 6 months ago