mthcht / Purpleteam
Purpleteam scripts simulation & Detection - trigger events for SOC detections
☆169Updated 3 weeks ago
Alternatives and similar repositories for Purpleteam:
Users that are interested in Purpleteam are comparing it to the libraries listed below
- A collection of CVEs weaponized by ransomware operators☆103Updated 2 weeks ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆116Updated 9 months ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆151Updated 7 months ago
- CarbonBlack EDR detection rules and response actions☆71Updated 4 months ago
- Active C&C Detector☆152Updated last year
- A repository of my own Sigma detection rules.☆156Updated 4 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆116Updated last year
- Some Threat Hunting queries useful for blue teamers☆123Updated 2 years ago
- Sigma rules to share with the community☆115Updated 3 months ago
- ☆156Updated last year
- Harness the power of Splunk for your investigations☆83Updated last month
- yara detection rules for hunting with the threathunting-keywords project☆92Updated this week
- Windows Malware Investigation Scripts & Docs☆75Updated 2 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆59Updated last year
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆245Updated last year
- A collection of various SIEM rules relating to malware family groups.☆64Updated 7 months ago
- PowerShell tools to help defenders hunt smarter, hunt harder.☆172Updated this week
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆82Updated 2 months ago
- The Threat Actor Profile Guide for CTI Analysts☆101Updated last year
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆178Updated 6 months ago
- A repository to share publicly available Velociraptor detection content☆124Updated this week
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆145Updated 3 months ago
- ☆72Updated 2 weeks ago
- Completely Risky Active-Directory Simulation Hub☆99Updated last year
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 8 months ago
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆75Updated 7 months ago
- God Mode Detection Rules☆133Updated 5 months ago
- MISP Playbooks☆182Updated last month
- PowerShell script designed to help Incident Responders collect forensic evidence from local and remote Windows devices.☆93Updated 4 months ago
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆85Updated last year