elastic / endpointLinks
☆41Updated 6 months ago
Alternatives and similar repositories for endpoint
Users that are interested in endpoint are comparing it to the libraries listed below
Sorting:
- OSSEM Data Dictionaries☆63Updated 8 months ago
- Anything Sysmon related from the MSTIC R&D team☆156Updated last year
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago
- ☆75Updated last week
- A CALDERA plugin☆78Updated this week
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 6 months ago
- Memory Forensic System on Cloud☆91Updated last year
- A MITRE Caldera plugin☆46Updated 10 months ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆205Updated 3 years ago
- My conference presentations☆83Updated last week
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆79Updated 4 months ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆170Updated 2 years ago
- Fast IOC and YARA Scanner☆83Updated 5 years ago
- The Sigma command line interface based on pySigma☆158Updated last month
- Elastic Security Labs releases☆81Updated this week
- Open IOC sharing platform☆61Updated 11 months ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆162Updated 10 months ago
- ☆130Updated last year
- ☆60Updated 3 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆155Updated 3 years ago
- LOKI2 - Simple IOC and YARA Scanner☆102Updated 3 months ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆66Updated last year
- ForgeArmory provides TTPs that can be used with the TTPForge (https://github.com/facebookincubator/ttpforge).☆118Updated last year
- ☆33Updated last week
- Collection of useful Canary tools☆91Updated 2 months ago
- Sigma rules to share with the community☆121Updated 8 months ago
- Active C2 IoCs☆99Updated 2 years ago
- Provides an advanced input.conf file for Windows and 3rd party related software with more than 70 different event log mapped to the MITRE…☆94Updated 3 months ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆258Updated 2 years ago
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆138Updated last year