mandiant / ThreatPursuit-VM
Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as well as threat hunters to get up and running quickly.
☆1,266Updated last year
Alternatives and similar repositories for ThreatPursuit-VM
Users that are interested in ThreatPursuit-VM are comparing it to the libraries listed below
Sorting:
- Defences against Cobalt Strike☆1,283Updated 2 years ago
- Windows Events Attack Samples☆2,356Updated 2 years ago
- Detect Tactics, Techniques & Combat Threats☆2,159Updated last week
- An Active Defense and EDR software to empower Blue Teams☆1,273Updated last year
- TrustedSec Sysinternals Sysmon Community Guide☆1,214Updated 11 months ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,591Updated last year
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,336Updated 6 months ago
- A collection of red team and adversary emulation resources developed and released by MITRE.☆506Updated 4 years ago
- Actionable analytics designed to combat threats☆984Updated 2 years ago
- Re-play Security Events☆1,641Updated last year
- Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK☆1,067Updated 5 months ago
- A curated list of the most important and useful resources about Threat Detection,Hunting and Intelligence.☆558Updated 2 years ago
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,458Updated 3 months ago
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,156Updated last year
- yarGen is a generator for YARA rules☆1,642Updated last month
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,274Updated 3 months ago
- Utilities for Sysmon☆1,520Updated 2 months ago
- A collection of resources for Threat Hunters☆881Updated 7 months ago
- Repository of YARA rules made by Trellix ATR Team☆596Updated last month
- Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.☆918Updated 3 weeks ago
- Open Source Security Events Metadata (OSSEM)☆1,266Updated 2 years ago
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,194Updated 3 months ago
- Guidance for mitigation web shells. #nsacyber☆972Updated last year
- Sophos-originated indicators-of-compromise from published reports☆585Updated last week
- ☆2,269Updated last year
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,470Updated this week
- A repository of sysmon configuration modules☆2,774Updated 8 months ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆2,885Updated 10 months ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆705Updated 2 years ago
- ReversingLabs YARA Rules☆817Updated last month