hulkmode / echothreat
☆18Updated last week
Alternatives and similar repositories for echothreat
Users that are interested in echothreat are comparing it to the libraries listed below
Sorting:
- Scripts for rapid Windows endpoint "tactical triage" and investigations with Velociraptor and KAPE☆123Updated last week
- Tools for simulating threats☆183Updated last year
- Manage Windows auditing policies.☆35Updated last month
- Real-time Response scripts and schema☆111Updated last year
- This repository contains Community and Field contributed content for LogScale☆226Updated last week
- MISP to Sentinel integration☆67Updated last month
- A repository to share publicly available Velociraptor detection content☆163Updated this week
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆137Updated 2 weeks ago
- A preconfigured Velociraptor triage collector☆51Updated last week
- A list of Splunk queries that I've collected and used over time.☆81Updated 4 years ago
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆248Updated last week
- Tools to automatically create a SANS index based off the course pdf files.☆100Updated 4 years ago
- Windows Malware Investigation Scripts & Docs☆82Updated 6 months ago
- ☆36Updated last month
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆84Updated 3 months ago
- Repository of SentinelOne Deep Visibility queries.☆127Updated 3 years ago
- Create lab environment for Linux Command Line course☆46Updated 7 months ago
- A collection of Splunk's Search Processing Language (SPL) for Threat Hunting with CrowdStrike Falcon☆201Updated 4 years ago
- ☆83Updated 2 months ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆111Updated 5 months ago
- This repository contains various threat hunting tools written in Python and is documented in the series Python Threat Hunting Tools which…☆13Updated last year
- An opensource sigma conversion tool built using pysigma☆125Updated 4 months ago
- ☆58Updated last year
- Jupyter notebooks for threat hunting☆56Updated last month
- ☆43Updated 2 years ago
- Repository of attack and defensive information for Business Email Compromise investigations☆251Updated this week
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆114Updated 6 months ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆60Updated 3 months ago
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆189Updated 10 months ago
- ☆52Updated last year