izysec / linux-audit
Some resources to facilitate my blog on auditd for security monitoring
☆11Updated last year
Related projects ⓘ
Alternatives and complementary repositories for linux-audit
- ☆41Updated 7 months ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆21Updated last week
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 2 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Automated detection rule analysis utility☆29Updated 2 years ago
- A happy place for detection engineers, purple teamers and threat hunters focusing on macOS.☆20Updated 2 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆13Updated 3 years ago
- DNS Dashboard for hunting and identifying beaconing☆14Updated 4 years ago
- ☆17Updated 3 months ago
- ☆15Updated 2 years ago
- C# User Simulation☆33Updated 2 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated last year
- Look into EDR events from network☆23Updated 7 months ago
- Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant data☆13Updated 5 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆53Updated 3 years ago
- Send High & New Incidents to The Hive incident management Platform☆17Updated 3 years ago
- Links to malware-related YARA rules☆14Updated 2 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 2 years ago
- Threat hunting with EQL and Bro. This repo contains modifications to EQL and EQLLib to use BRO logs.☆8Updated 5 years ago
- Manticore Adversary Emulation Cli☆46Updated 4 years ago
- Analytics for Accounting logs from Network devices☆16Updated 3 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 2 years ago
- ☆34Updated last year
- Windows Security Logging☆43Updated 2 years ago
- ☆30Updated 6 years ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆21Updated 2 years ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 3 years ago
- A few quick recipes for those that do not have much time during the day☆21Updated 3 weeks ago
- Automatic detection engineering technical state compliance☆50Updated 4 months ago