jymcheong / SysmonResources
Consolidation of various resources related to Microsoft Sysmon & sample data/log
☆109Updated 3 years ago
Alternatives and similar repositories for SysmonResources:
Users that are interested in SysmonResources are comparing it to the libraries listed below
- A collection of Splunk's Search Processing Language (SPL) for Threat Hunting with CrowdStrike Falcon☆199Updated 4 years ago
- Tools for simulating threats☆183Updated last year
- Splunk code (SPL) for serious threat hunters and detection engineers.☆273Updated last year
- Build a attack range in your local machine☆130Updated last year
- Misc Threat Hunting Resources☆374Updated 2 years ago
- ATT&CK Remote Threat Hunting Incident Response☆200Updated 3 months ago
- Repository of SentinelOne Deep Visibility queries.☆124Updated 3 years ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆151Updated 4 months ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆149Updated 2 weeks ago
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆295Updated 6 months ago
- Atomic Purple Team Framework and Lifecycle☆292Updated 4 years ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆279Updated 7 months ago
- Dump of organized knowledge on DFIR☆133Updated 3 years ago
- Public Repo for Atomic Test Harness☆266Updated 8 months ago
- ☆57Updated last year
- Repository of public reference frameworks for the DFIR community.☆115Updated last year
- links collected from SOC Core Skills class☆85Updated 4 years ago
- Rules generated from our investigations.☆192Updated this week
- OSSEM Detection Model☆177Updated 2 years ago
- Scripts to facilitate filtering with Plaso☆124Updated 4 years ago
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆184Updated 2 years ago
- Set of SIGMA rules (>350) mapped to MITRE ATT&CK tactic and techniques☆354Updated 2 months ago
- DetectionLabELK is a fork from DetectionLab with ELK stack instead of Splunk.☆552Updated 3 years ago
- SPL cheatsheet for Splunk.☆21Updated 2 years ago
- The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Of…☆253Updated 4 years ago
- Repository of attack and defensive information for Business Email Compromise investigations☆249Updated last month
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆114Updated 5 months ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆114Updated last year
- Active Directory Purple Team Playbook☆106Updated last year
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆201Updated 2 years ago