ethansilvas / splunk-logs-and-investigations
Investigating attacks using Splunk Enterprise logs and creating SPL intrusion detection searches based on known attacker TTPs and anomaly behavior derived from statistical baselines
☆16Updated last year
Alternatives and similar repositories for splunk-logs-and-investigations:
Users that are interested in splunk-logs-and-investigations are comparing it to the libraries listed below
- ☆160Updated 10 months ago
- SIEM Cheat Sheet☆73Updated last year
- ☆94Updated this week
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆178Updated 6 months ago
- Some important DFIR Resources☆83Updated last year
- A Python script for analyzing email files to extract IP addresses, URLs, headers, and attachments, with functionalities for defanging IPs…☆15Updated 3 months ago
- A powerful home-lab focused on setting up Splunk SIEM and real-world use cases. If you’re interested to become SOC Analyst(Tier 1/2) , th…☆45Updated 9 months ago
- Unlock the power of Splunk SIEM for comprehensive log analysis. Collaborate and innovate with our Splunk Log Analysis Projects on GitHub☆103Updated 7 months ago
- Hands-on cybersecurity projects to enhance skills in phishing investigation, malware analysis, network intrusion detection, and DDoS atta…☆97Updated 7 months ago
- ☆32Updated 2 months ago
- Security Scripts and Sources for daily usage.☆51Updated this week
- ☆45Updated last month
- ☆42Updated last year
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆99Updated 5 months ago
- Digital forensics lab course, as offered in FAST NUCES Karachi during Spring 2023.☆288Updated last year
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆24Updated last month
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆80Updated last year
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆116Updated 9 months ago
- ☆55Updated 3 years ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆169Updated 3 weeks ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆214Updated last year
- A collection of various SIEM rules relating to malware family groups.☆64Updated 7 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆116Updated last year
- Advanced Bash script designed for conducting digital forensics on Linux systems☆138Updated 9 months ago
- Automating Security Detection Engineering, published by Packt☆52Updated 3 months ago
- MISP Playbooks☆182Updated last month
- Useful resources about phishing email analysis☆77Updated 3 years ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆151Updated 7 months ago
- CarbonBlack EDR detection rules and response actions☆71Updated 4 months ago