elastic / securitylabs-thrunting-toolsLinks
A collection of utilities to help with analysis on the command line.
☆18Updated last year
Alternatives and similar repositories for securitylabs-thrunting-tools
Users that are interested in securitylabs-thrunting-tools are comparing it to the libraries listed below
Sorting:
- OSSEM Data Dictionaries☆65Updated last year
- Script for parsing Symantec Endpoint Protection logs, VBNs, and ccSubSDK database.☆64Updated 3 years ago
- A pySigma wrapper to manage detection rules.☆44Updated 2 weeks ago
- Dettectinator - The Python library to your DeTT&CT YAML files.☆119Updated 3 weeks ago
- Windows event log anomaly detection powered by ATPA technologies☆26Updated 3 years ago
- Anything Sysmon related from the MSTIC R&D team☆156Updated last year
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆86Updated last month
- YARA rule analyzer to improve rule quality and performance☆111Updated 3 weeks ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆85Updated 2 years ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆69Updated last year
- Augmentation to Machine Readable CTI☆37Updated 5 months ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆55Updated last week
- SIEGMA - Transform Sigma rules into SIEM consumables☆159Updated 11 months ago
- pySigma Splunk backend☆41Updated this week
- Memory Baseliner is a script that can compare two windows memory images or perform frequency of occurrence / data stacking analysis on mu…☆55Updated 2 years ago
- Carve file metadata from NTFS index ($I30) attributes☆71Updated 2 years ago
- Threat Hunting & Incident Investigation with Osquery☆216Updated 3 years ago
- A community event for security researchers to share their favorite notebooks☆108Updated last year
- Command line access to the Registry☆167Updated this week
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆39Updated last month
- ☆14Updated last year
- The Infosec Community Definitive Guide to Jupyter Notebooks☆131Updated 5 years ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆69Updated 3 years ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆94Updated 4 years ago
- The idea is simply to save some quick notes that will make it easier for Splunk users to leverage KQL (Kusto), especially giving projects…☆44Updated 5 years ago
- ☆35Updated last year
- The Sigma command line interface based on pySigma☆176Updated last month
- This is a set of tools for doing forensics analysis on Microsoft ESE databases.☆128Updated 4 years ago
- This repository contains helper scripts and custom configs to get the best out of Google's Timesketch project.☆118Updated 2 years ago
- ☆65Updated 3 years ago