invictus-ir / Sigma-AWS
This repository contains the research and components of our research into using Sigma for AWS Incident Response.
☆29Updated last year
Alternatives and similar repositories for Sigma-AWS:
Users that are interested in Sigma-AWS are comparing it to the libraries listed below
- ☆18Updated 3 years ago
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆21Updated 8 months ago
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆27Updated last year
- Workflows for Shuffle☆21Updated 2 years ago
- ☆40Updated 2 months ago
- pocket guide for core detection engineering concepts☆28Updated last year
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆73Updated 11 months ago
- Repository that contains a set of purposefully erroneous Yara rules.☆51Updated last year
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆19Updated last year
- This repository contains sample log data that were collected after running adversary simulations in Microsoft 365☆20Updated 6 months ago
- ☆29Updated 5 months ago
- Track progress and keep notes while working through likethecoins' CTI Self Study Plan☆28Updated 2 years ago
- ☆27Updated 2 years ago
- A preconfigured Velociraptor triage collector☆51Updated last week
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated 10 months ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆38Updated last month
- ShellSweeping the evil.☆52Updated 10 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆31Updated 6 months ago
- AWSATT&CK adds MITRE ATT&CK context and additional logging capabilities to Rhino Security Labs's open-source AWS exploitation framework, …☆45Updated 4 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Updated 3 months ago
- ☆41Updated 2 months ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆67Updated last year
- The ultimate repository for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆23Updated last week
- A preconfigured Windows-based system designed for rapid forensic investigations in both Azure and AWS.☆39Updated last year
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14Updated last year
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- ☆47Updated 3 weeks ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆55Updated 3 years ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- ☆43Updated last month