iThreatopedia / iThreatopedia.github.io
A happy place for detection engineers, purple teamers and threat hunters focusing on macOS.
☆20Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for iThreatopedia.github.io
- ☆41Updated 7 months ago
- Automatic detection engineering technical state compliance☆50Updated 4 months ago
- CSIRT Jump Bag☆27Updated 6 months ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 2 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆56Updated 3 weeks ago
- Send High & New Incidents to The Hive incident management Platform☆17Updated 3 years ago
- Threat Box Assessment Tool☆19Updated 3 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 4 years ago
- Can you pay the ransom in your country?☆13Updated 10 months ago
- ☆24Updated 2 years ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated last year
- A few quick recipes for those that do not have much time during the day☆21Updated last week
- ☆27Updated 2 weeks ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- Threat Hunter's Knowledge Base☆21Updated 2 years ago
- ☆11Updated 3 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 3 years ago
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Updated 3 years ago
- Track progress and keep notes while working through likethecoins' CTI Self Study Plan☆28Updated 2 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆16Updated 3 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 2 years ago
- Sharing Threat Hunting runbooks☆24Updated 5 years ago
- Automated detection rule analysis utility☆29Updated 2 years ago
- ☆19Updated 3 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Library of threat hunts to get any user started!☆40Updated 4 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆32Updated 9 months ago
- MITRE Shield website☆18Updated 3 years ago
- Penguin OS Forensic (or Flight) Recorder☆37Updated 3 months ago