elastic / endpointLinks
☆40Updated 5 months ago
Alternatives and similar repositories for endpoint
Users that are interested in endpoint are comparing it to the libraries listed below
Sorting:
- OSSEM Data Dictionaries☆62Updated 7 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆65Updated 3 years ago
- My conference presentations☆82Updated 3 weeks ago
- Slides of my public talks☆56Updated last year
- Anything Sysmon related from the MSTIC R&D team☆156Updated last year
- A home for detection content developed by the delivr.to team☆70Updated 3 weeks ago
- ☆69Updated 6 months ago
- Memory Forensic System on Cloud☆91Updated last year
- A GUI to query the API of abuse.ch.☆70Updated 3 years ago
- Active Directory Purple Team Playbook☆110Updated 2 years ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆132Updated 7 months ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆38Updated last year
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆78Updated 2 months ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 5 months ago
- This repository contains supplemental items including IOCs, and signatures discussed in Huntress blogposts, and other media.☆42Updated last month
- Elastic Security Labs releases☆80Updated 2 months ago
- Full of public notes and Utilities☆128Updated 6 months ago
- Forensic Artifact Collection Tool Matrix☆89Updated 9 months ago
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆78Updated 4 years ago
- A CALDERA plugin☆77Updated last week
- A CALDERA plugin☆26Updated last year
- Provides an advanced input.conf file for Windows and 3rd party related software with more than 70 different event log mapped to the MITRE…☆94Updated 2 months ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆204Updated 3 years ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆80Updated 3 months ago
- ☆60Updated 3 years ago
- ☆84Updated last month
- The Github project for The Defender's Guide by Luke Paine and Jonathan Johnson☆155Updated 2 years ago
- Open Threat Hunting Framework☆118Updated 2 years ago
- ☆43Updated last month
- A collection of tools to interact with Microsoft Security Response Center API☆101Updated last year