cybersheepdog / Threat-Hunting-MetricsLinks
Threat Hunting is time consuming enough as it is. Coming up with and tracking metrics to justify your hunt team to the Execs often takes time away from your Threat Hunting. I have created this Excel document to help automate as much of that as possible. The Strategic Overview tab is auto-updated based upon what you enter in the Threat Hunts Ta…
☆13Updated 3 years ago
Alternatives and similar repositories for Threat-Hunting-Metrics
Users that are interested in Threat-Hunting-Metrics are comparing it to the libraries listed below
Sorting:
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆77Updated last year
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆97Updated 2 years ago
- BlackBerry Threat Research & Intelligence☆99Updated 2 years ago
- Sigma detection rules for hunting with the threathunting-keywords project☆57Updated 9 months ago
- The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the hos…☆32Updated 3 years ago
- Full of public notes and Utilities☆129Updated 10 months ago
- ☆13Updated last year
- ☆67Updated 3 weeks ago
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆88Updated 10 months ago
- ☆76Updated 2 months ago
- Detection Engineering with YARA☆87Updated last year
- Jupyter notebooks for threat hunting☆60Updated 8 months ago
- Sigma rules to share with the community☆123Updated 10 months ago
- User Feedback Space of #MitreAssistant☆38Updated 2 years ago
- A repository to share publicly available Velociraptor detection content☆191Updated last week
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆125Updated 2 years ago
- A dataset containing Office 365 Unified Audit Logs for security research and detection☆59Updated 3 years ago
- CarbonBlack EDR detection rules and response actions☆73Updated last year
- VelociraptorMCP is a Model Context Protocol bridge for exposing LLMs to MCP clients.☆64Updated 4 months ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆51Updated 7 months ago
- ☆91Updated 4 months ago
- The Threat Actor Profile Guide for CTI Analysts☆115Updated 2 years ago
- ☆22Updated 2 years ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆114Updated last year
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆89Updated 2 years ago
- This repo is where I store my Threat Hunting ideas/content☆87Updated 2 years ago
- A repository of my own Sigma detection rules.☆162Updated 3 weeks ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Updated 3 years ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated 2 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆208Updated 3 years ago