karemfaisal / SMUC
Simplified MITRE Use Cases, it describes the Attack and Detection
☆45Updated 4 years ago
Alternatives and similar repositories for SMUC
Users that are interested in SMUC are comparing it to the libraries listed below
Sorting:
- Userland API monitor for threat hunting☆58Updated 5 years ago
- Various capabilities for static malware analysis.☆78Updated 8 months ago
- Hunt malware with Volatility☆47Updated last year
- Machine Interrogation To Identify Gaps & Techniques for Execution☆32Updated 2 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆54Updated last year
- Random notes collected on the intertubes relating to DFIR☆32Updated last year
- Three datasets to practice Threat Hunting against.☆45Updated last year
- Understanding and analyzing carrier files workshop repo☆50Updated 5 years ago
- Random hunting ordiented yara rules☆96Updated 2 years ago
- Malware similarity platform with modularity in mind.☆78Updated 3 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆105Updated 2 years ago
- Capa analysis importer for Ghidra.☆61Updated 4 years ago
- Cuckoo running in a nested hypervisor☆128Updated 5 years ago
- The Windows Malware Analysis Reversing Core Tools☆95Updated 4 years ago
- ☆49Updated 2 years ago
- YARA rule analyzer to improve rule quality and performance☆100Updated last month
- Lokix Platform is a free open-source solution to help blue teams and threat hunters use Loki Scanner to sweep enterprise networks☆25Updated 4 years ago
- Carbon Black Response IR tool☆53Updated 4 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆44Updated 3 years ago
- JPCERT/CC public YARA rules repository☆106Updated 5 months ago
- ☆65Updated 2 years ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Updated last year
- TA505+ Adversary Simulation☆65Updated 4 years ago
- ☆66Updated 2 years ago
- ☆27Updated 3 years ago
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆118Updated 2 years ago
- Mindmaps for threat hunting - work in progress.☆151Updated 3 years ago
- Cloud Templates and scripts to deploy mordor environments☆129Updated 4 years ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆63Updated 2 years ago
- A repo to document API functions mapped to security events across diverse platforms☆75Updated 5 years ago