dfirence / ma-insights-xeView external linksLinks
User Feedback Space of #MitreAssistant
☆38May 19, 2023Updated 2 years ago
Alternatives and similar repositories for ma-insights-xe
Users that are interested in ma-insights-xe are comparing it to the libraries listed below
Sorting:
- ☆11Jun 12, 2023Updated 2 years ago
- CERT Australia Cyber Threat Intelligence (CTI) Toolkit☆15Nov 11, 2017Updated 8 years ago
- ☆14Mar 5, 2021Updated 4 years ago
- Small scripts and POCs related to digital forensics☆18Nov 1, 2022Updated 3 years ago
- This batch script file wants to check your EDR systems detection and response capabilities in a more noisy way!☆11Jul 3, 2020Updated 5 years ago
- A threat sighting collects the behavior of a real threats and the observables used during its engagement.☆12Mar 29, 2022Updated 3 years ago
- CarbonBlack EDR detection rules and response actions☆73Sep 10, 2024Updated last year
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Dec 9, 2024Updated last year
- VTC - Velociraptor Timeline Creator☆19May 15, 2024Updated last year
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 5 years ago
- MITRE package gives you an approach to cybersecurity data sets.☆19Dec 20, 2022Updated 3 years ago
- Get USB Devices from Registry hives☆22Nov 15, 2021Updated 4 years ago
- Tweettioc Splunk App☆20Aug 25, 2020Updated 5 years ago
- Simple Honeypot for Atlassian Confluence (CVE-2022-26134)☆20Jun 7, 2022Updated 3 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Feb 13, 2021Updated 5 years ago
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆54Jul 31, 2022Updated 3 years ago
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆45Aug 17, 2020Updated 5 years ago
- A generic security incident response playbook investigating and responding to potential compromises of Okta's internal systems, in the co…☆20Mar 24, 2022Updated 3 years ago
- Expert Investigation Guides☆51Mar 18, 2021Updated 4 years ago
- Manage Your Large Team of Consultants☆11Sep 18, 2025Updated 4 months ago
- Cortex EDR Ransomware protection Bypass☆26Feb 8, 2025Updated last year
- urlyzer is a URL parsing analysis tool.☆24Jul 27, 2024Updated last year
- Sigma detection rules for hunting with the threathunting-keywords project☆58Mar 2, 2025Updated 11 months ago
- Get the process name or process id on windows☆20Jun 1, 2025Updated 8 months ago
- AI-Powered, Local Pythonic Coding Agent 🐞💻☆24Mar 3, 2025Updated 11 months ago
- A completely unsupported set of scripts used in SANS FOR572, Advanced Network Forensics and Analysis☆28Aug 6, 2025Updated 6 months ago
- AWS EKS Cluster Forensics☆23Aug 16, 2021Updated 4 years ago
- A repository of my own Sigma detection rules.☆163Nov 25, 2025Updated 2 months ago
- clean interface for the windows event log☆26Jun 8, 2024Updated last year
- The JSON REST API for the National Vulnerability Database☆24Dec 26, 2022Updated 3 years ago
- Defender Resource Hub☆30Jan 5, 2026Updated last month
- Machine learning enabled dropper☆28May 1, 2023Updated 2 years ago
- Plugin to label PEB addresses.☆31Feb 28, 2017Updated 8 years ago
- My Year of Python Repository☆28Jun 13, 2020Updated 5 years ago
- ☆67Sep 1, 2023Updated 2 years ago
- Azure function to insert MISP data in to Azure Sentinel☆34Oct 19, 2022Updated 3 years ago
- Golang parser for OLE files☆33Dec 4, 2025Updated 2 months ago
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆36Aug 12, 2022Updated 3 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆33Apr 15, 2021Updated 4 years ago