elastic / endpoint
☆34Updated 3 weeks ago
Alternatives and similar repositories for endpoint:
Users that are interested in endpoint are comparing it to the libraries listed below
- OSSEM Data Dictionaries☆59Updated 3 months ago
- ☆19Updated this week
- A collection of my presentations, blog posts, and other contributions to the information security community☆26Updated this week
- pySigma Splunk backend☆38Updated 2 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- A CALDERA plugin☆76Updated this week
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆53Updated 2 years ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆46Updated last month
- Elastic version of SOC prime watcher rules☆29Updated 6 months ago
- Actionable data for Security Operations☆18Updated 3 years ago
- ☆48Updated this week
- Anything Sysmon related from the MSTIC R&D team☆152Updated 10 months ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆38Updated last year
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 3 years ago
- Open IOC sharing platform☆56Updated 5 months ago
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 5 months ago
- Slides of my public talks☆55Updated last year
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆67Updated last year
- Provides an advanced input.conf file for Windows and 3rd party related software with more than 70 different event log mapped to the MITRE…☆90Updated 2 months ago
- A MITRE Caldera plugin☆43Updated 5 months ago
- Fast IOC and YARA Scanner☆79Updated 5 years ago
- This repository is created to store the artifacts for any intrusions I share publicly.☆25Updated last year
- Full of public notes and Utilities☆98Updated 2 months ago
- Open-source Fabric templates for cybersecurity and compliance☆17Updated 3 months ago
- ☆68Updated 2 months ago
- ☆23Updated 2 years ago
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆22Updated 5 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆121Updated 4 years ago
- Convert Sigma rules to LogRhythm searches☆21Updated 3 years ago
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆49Updated last month