karemfaisal / SMUCLinks
Simplified MITRE Use Cases, it describes the Attack and Detection
☆45Updated 4 years ago
Alternatives and similar repositories for SMUC
Users that are interested in SMUC are comparing it to the libraries listed below
Sorting:
- Userland API monitor for threat hunting☆58Updated 5 years ago
- Machine Interrogation To Identify Gaps & Techniques for Execution☆32Updated 2 years ago
- YARA rule analyzer to improve rule quality and performance☆101Updated last month
- A repo to document API functions mapped to security events across diverse platforms☆75Updated 5 years ago
- Research indicators and detection rules☆66Updated last year
- ☆116Updated last year
- Active Directory Purple Team Playbook☆108Updated 2 years ago
- List of PowerShell commands and commandlets that should be in your Powershel watchlist☆37Updated 3 years ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆18Updated 3 years ago
- TA505+ Adversary Simulation☆65Updated 4 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆45Updated 3 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆105Updated 2 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆56Updated last year
- Hunt malware with Volatility☆47Updated last year
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- My own diary notes. Adding the commands, tools, techniques, and resources that I will not memorize.☆15Updated last year
- Script for parsing Symantec Endpoint Protection logs, VBNs, and ccSubSDK database.☆65Updated 2 years ago
- Cuckoo running in a nested hypervisor☆128Updated 5 years ago
- Random notes collected on the intertubes relating to DFIR☆34Updated last year
- ☆27Updated 3 years ago
- ☆87Updated last year
- ☆38Updated 3 years ago
- Three datasets to practice Threat Hunting against.☆45Updated last year
- A list of Mitre Caldera compatible emulation-plans☆14Updated 4 years ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆63Updated 2 years ago
- Cloud Templates and scripts to deploy mordor environments☆129Updated 4 years ago
- Random hunting ordiented yara rules☆96Updated 2 years ago
- ☆27Updated 4 years ago
- The Windows Malware Analysis Reversing Core Tools☆95Updated 4 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Updated 4 years ago