kidcrash22 / Sysmon-Threat-IntelView external linksLinks
☆13Feb 6, 2018Updated 8 years ago
Alternatives and similar repositories for Sysmon-Threat-Intel
Users that are interested in Sysmon-Threat-Intel are comparing it to the libraries listed below
Sorting:
- Splunk App to assist Sysmon Threat Hunting☆38Mar 7, 2017Updated 8 years ago
- ☆42Sep 16, 2022Updated 3 years ago
- Postfix Add-on for Splunk (Compliant with the Mail CIM model)☆11Mar 18, 2021Updated 4 years ago
- A set of Splunk workflow action definitions to export field values to CyberChef for further analysis.☆13Jan 22, 2018Updated 8 years ago
- MITRE ATT&CK Framework compliance dashboard and correlation searches that works with Splunk Enterprise Security and ES Content Update☆30Nov 7, 2025Updated 3 months ago
- Sysmon Splunk App☆47Aug 21, 2018Updated 7 years ago
- Knowing which rule should trigger according to the redcannary test☆11Nov 23, 2024Updated last year
- pySigma Splunk backend☆41Feb 8, 2026Updated last week
- Automated install scripts for Cuckoo sandbox☆38Dec 5, 2017Updated 8 years ago
- Lists of sources and utilities utilized to hunt, detect and prevent evildoers.☆168Dec 10, 2018Updated 7 years ago
- ☆15Aug 29, 2025Updated 5 months ago
- Find permanent WMI event consumers on endpoints that could be used by APT actors.☆17Jun 15, 2016Updated 9 years ago
- Advanced Persistent Threat Detection Using Network Analysis☆23Feb 28, 2019Updated 6 years ago
- Maps process creation logged by Sysmon uses Google Org Chart API☆23Mar 5, 2016Updated 9 years ago
- VirusTotal SIEM Integration and Automation☆18Jan 16, 2017Updated 9 years ago
- Look into EDR events from network☆25Nov 20, 2025Updated 2 months ago
- pocket guide for core threat hunting concepts☆23May 6, 2020Updated 5 years ago
- AWS EKS Cluster Forensics☆23Aug 16, 2021Updated 4 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Jul 27, 2020Updated 5 years ago
- Custom Splunk search command to reconstruct a pstree from Sysmon process creation events (EventCode 1)☆24Mar 3, 2023Updated 2 years ago
- Apps for Splunk Phantom security automation | Cisco Meraki | Ansible Tower | F5 | A10☆24May 29, 2020Updated 5 years ago
- Framework for Detection Evaluation (F4DE) : set of evaluation tools for detection evaluations and for specific NIST-coordinated evaluatio…☆25Jul 6, 2017Updated 8 years ago
- Simple Windows Event Log Forwarder (SWELF). Its easy to use/simply works Log Forwarder and EVTX Parser. Almost in full release here at ht…☆24Jun 20, 2023Updated 2 years ago
- Data Driven Threat Hunting on the RaspberryPi☆31Jan 26, 2022Updated 4 years ago
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆30Jul 27, 2023Updated 2 years ago
- Cheat sheets for threat hunting, detection and other stuff.☆34Oct 7, 2022Updated 3 years ago
- pcapdj - dispatch pcap files☆46Jul 28, 2020Updated 5 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- Deterministic security layer for Openclaw(Clawdbot), Cursor and Claude Code. Write secure code, prevent data exfil, and more☆39Feb 5, 2026Updated last week
- Smart Life API☆13Dec 6, 2017Updated 8 years ago
- Ruins & Riches Ultima Online Server Files☆10Oct 15, 2023Updated 2 years ago
- ☆14Feb 6, 2026Updated last week
- Powershell scripts using CyCLI.☆10May 22, 2019Updated 6 years ago
- ☆39Feb 12, 2020Updated 6 years ago
- A curated list of awesome YARA rules, tools, and people.☆33Oct 26, 2023Updated 2 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- Reconstruct process trees from event logs☆147Aug 12, 2020Updated 5 years ago
- Deploy and maintain Symon through the Splunk Deployment Sever☆32Jul 30, 2020Updated 5 years ago