frack113 / sigma_redcanarycoLinks
Knowing which rule should trigger according to the redcannary test
☆11Updated last year
Alternatives and similar repositories for sigma_redcanaryco
Users that are interested in sigma_redcanaryco are comparing it to the libraries listed below
Sorting:
- ☆13Updated last year
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆77Updated last year
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated 2 years ago
- Collection of scripts provided for public use☆38Updated 2 weeks ago
- A preconfigured Velociraptor triage collector☆73Updated 3 weeks ago
- A repository of my own Sigma detection rules.☆163Updated 2 months ago
- ☆35Updated last year
- This repository contains sample log data that were collected after running adversary simulations in Microsoft 365☆23Updated last year
- ☆67Updated 2 years ago
- A repository to share publicly available Velociraptor detection content☆194Updated this week
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆38Updated last month
- Sigma detection rules for hunting with the threathunting-keywords project☆58Updated 10 months ago
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆89Updated 11 months ago
- ☆21Updated 3 years ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆54Updated 3 weeks ago
- Script to automate Linux live evidence collection☆28Updated 3 years ago
- User Feedback Space of #MitreAssistant☆38Updated 2 years ago
- ☆54Updated last year
- This repository contains helper scripts and custom configs to get the best out of Google's Timesketch project.☆118Updated 2 years ago
- Remote access and Antivirus Logging Database☆44Updated last year
- Jupyter notebooks for threat hunting☆60Updated 10 months ago
- ☆92Updated 6 months ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆69Updated last year
- ☆22Updated 3 years ago
- USN Journal full path builder☆65Updated last year
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆127Updated 2 years ago
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆90Updated 2 years ago
- Memory Baseliner is a script that can compare two windows memory images or perform frequency of occurrence / data stacking analysis on mu…☆55Updated 2 years ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆86Updated last month
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆68Updated last year