eddiechu / Encrypt-Delete-Test
Really can protect from ransomware encryption?
☆42Updated 6 months ago
Related projects ⓘ
Alternatives and complementary repositories for Encrypt-Delete-Test
- This Repository gives the best and possible strategies against hunting the ransomware☆24Updated 2 years ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 6 months ago
- This repo is where I store my Threat Hunting ideas/content☆85Updated last year
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆146Updated last year
- ☆155Updated 11 months ago
- ☆61Updated 3 years ago
- Cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for them☆26Updated 8 months ago
- CarbonBlack EDR detection rules and response actions☆71Updated 2 months ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- This Repository Talks about the Follina MSDT from Defender Perspective☆38Updated 2 years ago
- ☆43Updated last month
- BlueBox Malware analysis Box and Cyber threat intelligence.☆38Updated 2 years ago
- Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.☆15Updated last year
- IOC Collection 2022☆55Updated last year
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆23Updated this week
- Some Threat Hunting queries useful for blue teamers☆123Updated 2 years ago
- Assess Windows OS for security misconfigurations and hardening opportunities.☆31Updated 4 months ago
- ☆19Updated last year
- Forensics artifacts collection☆19Updated 3 years ago
- Contains All tools i Use For Red Team OPs in Windows Environment. NOTE: I am not the Creator Of these tools. These are the tools i use.☆20Updated 2 years ago
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆41Updated 2 years ago
- Sigma detection rules for hunting with the threathunting-keywords project☆47Updated 2 weeks ago
- yara detection rules for hunting with the threathunting-keywords project☆87Updated this week
- Resources from the Security Presentation☆11Updated 3 weeks ago
- Repository where I hold random detection and threat hunting queries that I come up with based on different sources of information (or eve…☆38Updated 2 weeks ago
- ☆72Updated this week
- ☆25Updated 3 years ago
- A collection of Sigma rules organized by MITRE ATT&CK technique☆16Updated 3 years ago
- Linux Baseline and Forensic Triage Tool - BETA☆50Updated 2 years ago
- MITRE ATT&CK mapped queries for SentinelOne Deep Visiblity☆86Updated 3 years ago