mandiant / sunburst_countermeasuresLinks
☆562Updated 2 years ago
Alternatives and similar repositories for sunburst_countermeasures
Users that are interested in sunburst_countermeasures are comparing it to the libraries listed below
Sorting:
- A collection of red team and adversary emulation resources developed and released by MITRE.☆530Updated 4 years ago
- SunBurst DGA Decode Script☆205Updated 5 years ago
- Tools for hunting for threats.☆599Updated 8 months ago
- Scripts and a (future) library to improve users' interactions with the ATT&CK content☆591Updated 2 years ago
- Python Script to access ATT&CK content available in STIX via a public TAXII server☆569Updated last month
- Logging Made Easy☆709Updated 2 years ago
- Indicators from Unit 42 Public Reports☆728Updated 5 months ago
- Actionable analytics designed to combat threats☆1,005Updated 3 years ago
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,174Updated 2 years ago
- Open Source Security Events Metadata (OSSEM)☆1,286Updated 2 years ago
- Re-play Security Events☆1,716Updated last year
- A set of Zeek scripts to detect ATT&CK techniques.☆617Updated last year
- Tools, techniques, cheat sheets, and other resources to assist those defending organizations and detecting adversaries☆458Updated 3 years ago
- A Python package to interact with the Mitre ATT&CK Framework☆477Updated 2 years ago
- Cyber Analytics Repository☆976Updated 8 months ago
- ☆1,093Updated 6 years ago
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆298Updated 2 months ago
- TrustedSec Sysinternals Sysmon Community Guide☆1,354Updated last month
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,302Updated 2 years ago
- Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 en…☆1,432Updated 3 years ago
- Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK☆1,076Updated last year
- DetectionLabELK is a fork from DetectionLab with ELK stack instead of Splunk.☆574Updated 4 years ago
- Online hash checker for Virustotal and other services☆843Updated 10 months ago
- Configuration guidance for implementing collection of security relevant Windows Event Log events by using Windows Event Forwarding. #nsac…☆881Updated 5 years ago
- Understand adversary tradecraft and improve detection strategies☆715Updated 2 years ago
- Documentation of TheHive☆399Updated 2 years ago
- Sophos-originated indicators-of-compromise from published reports☆649Updated 2 weeks ago
- This content is analysis and research of the data sources currently listed in ATT&CK.☆414Updated 2 years ago
- Tool Analysis Result Sheet☆356Updated 8 years ago
- Threat Report ATT&CK™ Mapping (TRAM) is a tool to aid analyst in mapping finished reports to ATT&CK.☆356Updated 4 years ago