haidermdost / Threat-Detection-Maturity-Framework
☆18Updated 3 years ago
Alternatives and similar repositories for Threat-Detection-Maturity-Framework:
Users that are interested in Threat-Detection-Maturity-Framework are comparing it to the libraries listed below
- Recon Hunt Queries☆76Updated 3 years ago
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆27Updated last year
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23Updated 2 years ago
- pocket guide for core detection engineering concepts☆27Updated last year
- ☆65Updated 9 months ago
- Powershell Functions to interact with TheHive-Project☆10Updated 5 years ago
- Library of threat hunts to get any user started!☆42Updated 4 years ago
- Expert Investigation Guides☆51Updated 3 years ago
- pocket guide for core threat hunting concepts☆23Updated 4 years ago
- A completely unsupported set of scripts used in SANS FOR572, Advanced Network Forensics and Analysis☆25Updated 2 months ago
- Automated detection rule analysis utility☆29Updated 2 years ago
- Workflows for Shuffle☆21Updated 2 years ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 3 years ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆65Updated 11 months ago
- This repository hosts community contributed Kestrel huntflows (.hf) and huntbooks (.ipynb)☆32Updated last year
- ☆39Updated 5 years ago
- CSIRT Jump Bag☆27Updated 9 months ago
- Slides and Other Resources from my latest Talks and Presentations☆24Updated 4 years ago
- AWS EKS Cluster Forensics☆23Updated 3 years ago
- Open-source Fabric templates for cybersecurity and compliance☆15Updated last month
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆61Updated 2 years ago
- Automatic detection engineering technical state compliance☆54Updated 7 months ago
- Cyber Threats Detection Rules☆14Updated last month
- pollen - A command-line tool for interacting with TheHive☆35Updated 5 years ago
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆25Updated last year
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Updated 2 weeks ago
- Searches for Insider Threat Hunting☆30Updated 5 years ago
- Quick script to build host or investigation timelines using Carbon Black Response☆12Updated 6 years ago
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆22Updated 5 years ago