Security Monitoring Resolution Categories
☆138Nov 25, 2021Updated 4 years ago
Alternatives and similar repositories for Use_Case_Applicability
Users that are interested in Use_Case_Applicability are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Intelligent Process Lifecycle of Active Cyber Defenders☆34Jan 1, 2023Updated 3 years ago
- EventList☆379Mar 21, 2021Updated 5 years ago
- ☆14May 30, 2018Updated 7 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Mar 19, 2019Updated 7 years ago
- A script to create and assign SOP tasks into the cases☆20Aug 16, 2020Updated 5 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Detect Tactics, Techniques & Combat Threats☆2,282Jan 21, 2026Updated 3 months ago
- A Splunk Technology Add-on to forward filtered ETW events.☆31Oct 14, 2020Updated 5 years ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆111Feb 6, 2020Updated 6 years ago
- Elasticsearch/Kibana environment and log data for Sigma workshop☆27Dec 20, 2019Updated 6 years ago
- Actionable analytics designed to combat threats☆1,007May 25, 2022Updated 3 years ago
- Misc Threat Hunting Resources☆378Jan 26, 2023Updated 3 years ago
- ☆34Aug 8, 2023Updated 2 years ago
- Open source information security policies☆16Jan 25, 2021Updated 5 years ago
- A Splunk app to use MISP in background☆112Mar 27, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Questions to ask about the team and company when you're interviewing for a CISO position☆15Oct 19, 2021Updated 4 years ago
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆1,070Oct 5, 2023Updated 2 years ago
- ATT&CK Remote Threat Hunting Incident Response☆206Dec 8, 2024Updated last year
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆27Jul 13, 2022Updated 3 years ago
- Open Source Security Events Metadata (OSSEM)☆1,293Feb 27, 2023Updated 3 years ago
- Creating a Feed of MISP Events from ThreatFox (by abuse.ch)☆19Jun 2, 2021Updated 4 years ago
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆45Aug 17, 2020Updated 5 years ago
- Atomic Red Team Simple Parser☆13Sep 21, 2018Updated 7 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆20May 25, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework☆357Nov 3, 2020Updated 5 years ago
- A framework for developing alerting and detection strategies for incident response.☆870Sep 8, 2025Updated 7 months ago
- intelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; inclu…☆41Mar 17, 2019Updated 7 years ago
- DFIRTrack - The Incident Response Tracking Application☆534Jan 13, 2026Updated 3 months ago
- Incident Response Methodologies☆1,017Aug 2, 2018Updated 7 years ago
- Import AbuseCH IOC Feeds into MISP☆12Feb 17, 2021Updated 5 years ago
- All-in-one bundle of MISP, TheHive and Cortex☆168Sep 27, 2022Updated 3 years ago
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.☆940Dec 12, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Utilities for MITRE™ ATT&CK☆1,052Jan 3, 2026Updated 3 months ago
- Defensomania is a security monitoring and incident response card game.☆64May 24, 2023Updated 2 years ago
- attack2jira automates the process of standing up a Jira environment that can be used to track and measure ATT&CK coverage☆115Mar 26, 2023Updated 3 years ago
- TrustedSec Sysinternals Sysmon Community Guide☆1,397Feb 10, 2026Updated 2 months ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Feb 27, 2019Updated 7 years ago
- An ELK environment containing interesting security datasets.☆136May 11, 2020Updated 5 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,541Jan 12, 2026Updated 3 months ago