illusconsulting / CDM-Generator
Generate a matrix based on an inventory of InfoSec tools
☆23Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for CDM-Generator
- Repository where I hold random detection and threat hunting queries that I come up with based on different sources of information (or eve…☆38Updated 2 weeks ago
- Sentinel Logic Apps/Playbooks to automate enrichment, incident analysis and more.☆75Updated 3 months ago
- ☆41Updated 7 months ago
- A collection of various SIEM rules relating to malware family groups.☆62Updated 5 months ago
- Security Scripts and Sources for daily usage.☆48Updated 2 weeks ago
- ☆72Updated this week
- M365/Azure adversary simulation tool designed to simulate adversary techniques and generate attack telemetry.☆112Updated this week
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆23Updated this week
- Hunting Queries for Defender ATP☆73Updated this week
- Cyber Defence related kusto queries for use in Azure Sentinel and Defender advanced hunting☆57Updated 3 weeks ago
- ADXFlowmaster helps SecOps teams Threat Hunt suspicious network traffic inside & outside of Azure.☆27Updated 3 weeks ago
- ☆32Updated last week
- The ultimate solution for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆22Updated 2 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆59Updated 3 weeks ago
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆101Updated 6 months ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆52Updated 3 weeks ago
- CarbonBlack EDR detection rules and response actions☆71Updated 2 months ago
- MISP to Sentinel integration☆60Updated this week
- Presentations from Conferences☆26Updated 2 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆43Updated last month
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆75Updated 11 months ago
- ☆48Updated last year
- VirtualGHOST Detection Tool☆87Updated 6 months ago
- Content Repo for Demystifying KQL Tutorial Series☆65Updated 2 months ago
- Slides of my public talks☆46Updated 11 months ago
- This repo aims to help you decipher the UAL from a Digital Forensics & Incident Response (DFIR) perspective. The UAL is the Microsoft 365…☆50Updated 6 months ago
- A repository for tracking events related to the MOVEit Transfer Cl0p Campaign☆67Updated last year
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆110Updated 7 months ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆97Updated this week