forscie / insider-threat-matrixView external linksLinks
An open framework for computer-enabled insider threat investigations. Contribute today!
☆23Dec 3, 2025Updated 2 months ago
Alternatives and similar repositories for insider-threat-matrix
Users that are interested in insider-threat-matrix are comparing it to the libraries listed below
Sorting:
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- Crane POAM Automation Tool (C-PAT™)☆15Feb 10, 2026Updated last week
- Command line utility and package for querying Steam A2S server information, featuring support for Arma 3 and DayZ. Outputs are displayed …☆19Jan 31, 2026Updated 2 weeks ago
- Microsoft-Defender-for-IoT☆14May 26, 2025Updated 8 months ago
- FedRAMP Documentation☆43Updated this week
- Threat Network Detection in Online Social Networks☆10Jan 20, 2017Updated 9 years ago
- Project that creates a Kubernetes environment in Azure (AKS) and protects it with CloudGuard CSPM / Workload and Appsec technologies☆10Jun 12, 2023Updated 2 years ago
- Terraform modules for cloud.gov managed services☆14Updated this week
- ☆11Feb 22, 2022Updated 3 years ago
- Automated Real-Time Threat Hunting with ATD, Active Response and Elasticsearch/Kibana☆10Aug 17, 2018Updated 7 years ago
- Active Response plugin. Osquery to execute wazuh/ossec active response plugins. You can write your own plugins, easy to plug☆11Jun 20, 2020Updated 5 years ago
- Security Lab☆13Jun 5, 2023Updated 2 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- A fast pure-Python search engine☆12Apr 9, 2009Updated 16 years ago
- ☆11Jan 9, 2026Updated last month
- Specification 1 (hierarchical style) for an agentic software development crew, for implementation with mainstream Agentic platforms like…☆21Updated this week
- ☆24Feb 5, 2026Updated last week
- Publicly accessible version of the FiGHT website.☆16Nov 14, 2025Updated 3 months ago
- Build your own threat hunting maturity model☆11Oct 29, 2017Updated 8 years ago
- Okta MCP Server☆20Aug 19, 2025Updated 5 months ago
- SIEM USE Case Selection Methodology☆17Sep 18, 2020Updated 5 years ago
- A Golang API for TheHive☆13Sep 3, 2020Updated 5 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆49Nov 11, 2022Updated 3 years ago
- Discover your CNCF devstats score based on your GitHub username☆14Jul 27, 2025Updated 6 months ago
- A fresh and calming theme for Hyprland inspired by nature. Green Garden brings a vibrant yet soothing feel to your desktop. Let me know w…☆22Feb 3, 2026Updated 2 weeks ago
- Create and manage on chain social graphs☆13Sep 4, 2025Updated 5 months ago
- Live system forensic collector☆16Jun 8, 2022Updated 3 years ago
- ☆14Oct 15, 2025Updated 4 months ago
- A web scraper to create MISP events and reports☆17Jun 30, 2025Updated 7 months ago
- Microsoft 365 Defender Hunting via PowerShell.☆14Feb 8, 2022Updated 4 years ago
- 🔥 A repository for collecting cyberdefense thoughts, books, and documents about AI cyberdefense☆13Jul 2, 2023Updated 2 years ago
- SmartResponse plugin development.☆15Sep 25, 2019Updated 6 years ago
- A hands-on workshop to learn how to do threat detection and response in AWS.☆11Sep 13, 2021Updated 4 years ago
- Creating an ATT&CK Navigator layer with the detection coverage of the signals available within Tanium Threat Response.☆11Jun 2, 2021Updated 4 years ago
- Get started building Azure Static Web Apps in Blazor☆13Mar 17, 2023Updated 2 years ago
- Network analysis with Wireshark, is the topic in this repo!☆14May 6, 2023Updated 2 years ago
- collection of materials and resources I use to teach computer security classes☆12Jun 25, 2021Updated 4 years ago
- ☆13Feb 6, 2018Updated 8 years ago