mttaggart / seclab
Automated security lab provisioning
☆73Updated 3 weeks ago
Alternatives and similar repositories for seclab:
Users that are interested in seclab are comparing it to the libraries listed below
- Completely Risky Active-Directory Simulation Hub☆99Updated last year
- Windows Malware Investigation Scripts & Docs☆81Updated 5 months ago
- Jupyter Notebooks for the Blue Team☆145Updated last month
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆188Updated 9 months ago
- WTF are these binaries doing?! A list of benign applications that mimic malicious behavior.☆164Updated 3 weeks ago
- ☆120Updated last year
- Creation of a laboratory for malware analysis in AWS☆95Updated 2 years ago
- Scripts for rapid Windows endpoint "tactical triage" and investigations with Velociraptor and KAPE☆122Updated 2 weeks ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆121Updated last year
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 11 months ago
- ☆74Updated 3 weeks ago
- ☆58Updated 3 years ago
- M365/Azure adversary simulation tool that generates realistic attack telemetry to help blue teams improve their detection and response ca…☆284Updated last month
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆77Updated 11 months ago
- CarbonBlack EDR detection rules and response actions☆71Updated 7 months ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆154Updated 2 weeks ago
- Retired TrustedSec Capabilities☆247Updated 4 months ago
- The Github project for The Defender's Guide by Luke Paine and Jonathan Johnson☆151Updated last year
- Elastic version of SOC prime watcher rules☆29Updated 6 months ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆120Updated 2 years ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆137Updated 2 weeks ago
- God Mode Detection Rules☆134Updated 8 months ago
- Repository for sharing examples of our artifacts data and for use in new analyst recruitment.☆90Updated last week
- Some Threat Hunting queries useful for blue teamers☆125Updated 2 years ago
- Some important DFIR Resources☆83Updated 2 years ago
- A repository to share publicly available Velociraptor detection content☆156Updated last week
- Open Threat Hunting Framework☆113Updated last year
- Tools for simulating threats☆183Updated last year
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆95Updated last year
- MITRE ATT&CK mapped queries for SentinelOne Deep Visiblity☆89Updated 4 years ago