haidermdost / Threat-Detection-Maturity-Framework
☆17Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for Threat-Detection-Maturity-Framework
- Recon Hunt Queries☆75Updated 3 years ago
- pocket guide for core detection engineering concepts☆27Updated last year
- Powershell Functions to interact with TheHive-Project☆10Updated 5 years ago
- Crowdstrike response script containing various functions for IR/triage☆12Updated 3 years ago
- Cyber Threats Detection Rules☆13Updated 2 months ago
- Quick script to build host or investigation timelines using Carbon Black Response☆12Updated 6 years ago
- Repository for SPEED SIEM Use Case Framework☆52Updated 4 years ago
- Library of threat hunts to get any user started!☆40Updated 4 years ago
- The project was moved here https://github.com/atomic-threat-coverage/atomic-threat-coverage☆23Updated 5 years ago
- Slides and Other Resources from my latest Talks and Presentations☆24Updated 3 years ago
- Automated detection rule analysis utility☆29Updated 2 years ago
- ☆39Updated 5 years ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 3 years ago
- Expert Investigation Guides☆50Updated 3 years ago
- A completely unsupported set of scripts used in SANS FOR572, Advanced Network Forensics and Analysis☆23Updated 4 months ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆65Updated 8 months ago
- Synopsis is a tool to aid analysts reviewing browser history files by providing a high-level “synopsis” of key information.☆20Updated 6 years ago
- ☆41Updated 3 years ago
- Compilation of resources to help with Adversary Simulation automation harness☆100Updated 4 years ago
- Sigma Detection Rule Repository☆85Updated 4 years ago
- CSIRT Jump Bag☆27Updated 6 months ago
- pocket guide for core threat hunting concepts☆23Updated 4 years ago
- ☆15Updated 3 years ago
- A script to create and assign SOP tasks into the cases☆18Updated 4 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆19Updated 2 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆56Updated last week
- Workflows for Shuffle☆20Updated 2 years ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆58Updated last year
- A collection of Terraform and Ansible scripts that automatically (and quickly) deploys a small Velociraptor R&D lab.☆20Updated 3 years ago