ethack / tht
Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science
☆119Updated this week
Related projects: ⓘ
- Tools for simulating threats☆170Updated 10 months ago
- Repository of attack and defensive information for Business Email Compromise investigations☆216Updated 3 weeks ago
- Scripts for rapid Windows endpoint "tactical triage" and investigations with Velociraptor and KAPE☆96Updated 5 months ago
- Full of public notes and Utilities☆81Updated 3 weeks ago
- A collection of Splunk's Search Processing Language (SPL) for Threat Hunting with CrowdStrike Falcon☆184Updated 4 years ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆108Updated last year
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆120Updated 6 months ago
- Windows Malware Investigation Scripts & Docs☆74Updated 5 months ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆113Updated 9 months ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆192Updated 2 years ago
- Resources To Learn And Understand SIGMA Rules☆163Updated last year
- Repository of public reference frameworks for the DFIR community.☆105Updated last year
- A repository of my own Sigma detection rules.☆155Updated last week
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆75Updated 3 months ago
- Some Threat Hunting queries useful for blue teamers☆120Updated 2 years ago
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆105Updated last year
- The Github project for The Defender's Guide by Luke Paine and Jonathan Johnson☆141Updated last year
- Conference presentations☆45Updated 10 months ago
- ☆50Updated last year
- Backdoors & Breaches: Campaigns. These are short guides to help Incident Captains by giving them game ideas based on actual breaches.☆31Updated 9 months ago
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆73Updated 2 years ago
- ☆52Updated 3 years ago
- Web application to create indexes for GIAC certification examinations.☆132Updated last year
- A python script developed to process Windows memory images based on triage type.☆259Updated 9 months ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆122Updated last year
- Tools to automatically create a SANS index based off the course pdf files.☆70Updated 4 years ago
- A port of BHIS's Backdoors & Breaches for playingcards.io☆59Updated last year
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Updated 2 years ago
- ☆72Updated last month
- The PoLRBear Project☆35Updated 3 years ago