jhainly / det3ct-the-att-ck
SIEM Detection Use Case Library mapped to MITRE ATT&CK tactics and techniques
☆12Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for det3ct-the-att-ck
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆58Updated last year
- Reference sheet for Threat Hunting Professional Course☆25Updated 5 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Updated 4 years ago
- Sharing Threat Hunting runbooks☆24Updated 5 years ago
- Incident Response Playbooks☆14Updated 5 years ago
- Expert Investigation Guides☆50Updated 3 years ago
- A completely unsupported set of scripts used in SANS FOR572, Advanced Network Forensics and Analysis☆23Updated 4 months ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆25Updated 10 months ago
- Slides and Other Resources from my latest Talks and Presentations☆24Updated 3 years ago
- A few quick recipes for those that do not have much time during the day☆21Updated 3 weeks ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆52Updated 2 years ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆76Updated 2 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 4 years ago
- Library of threat hunts to get any user started!☆40Updated 4 years ago
- The project was moved here https://github.com/atomic-threat-coverage/atomic-threat-coverage☆23Updated 5 years ago
- Notes on managing and coordinating the response to major cyber incidents☆39Updated 4 years ago
- FIles and guides related to using Elasticstack as a SIEM☆12Updated 4 years ago
- ☆34Updated 3 years ago
- Incident Response Report Using GitHub-Sphinx☆19Updated 5 years ago
- incident response scripts☆18Updated 5 years ago
- Workflows for Shuffle☆20Updated 2 years ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 3 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆50Updated 2 years ago
- ☆14Updated 4 years ago
- THOR MITRE ATT&CK Framework Coverage☆24Updated 4 years ago
- Tool used to perform threat intelligence against packet data☆35Updated 7 months ago
- Best practices in threat intelligence☆46Updated 2 years ago
- Presentation Slides and Video links☆31Updated 3 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆31Updated last year