murchisd / splunk_pstree_app
Custom Splunk search command to reconstruct a pstree from Sysmon process creation events (EventCode 1)
☆23Updated last year
Related projects ⓘ
Alternatives and complementary repositories for splunk_pstree_app
- Library of threat hunts to get any user started!☆40Updated 4 years ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆35Updated 11 months ago
- Collection of scripts provided for public use☆31Updated last week
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆68Updated last year
- The Intelligent Process Lifecycle of Active Cyber Defenders☆31Updated last year
- Recon Hunt Queries☆75Updated 3 years ago
- Automated detection rule analysis utility☆29Updated 2 years ago
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆73Updated 2 weeks ago
- Full of public notes and Utilities☆87Updated this week
- ShellSweeping the evil.☆52Updated 5 months ago
- Automatic detection engineering technical state compliance☆51Updated 4 months ago
- Technical add-on for Splunk related to TheHive/Cortex from TheHive project☆49Updated 3 weeks ago
- Test case indexes☆37Updated 4 months ago
- OSSEM Data Dictionaries☆59Updated 3 months ago
- Converts Sigma detection rules to a Splunk alert configuration.☆13Updated 3 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆50Updated 2 years ago
- Azure function to insert MISP data in to Azure Sentinel☆30Updated 2 years ago
- Import specific data sources into the Sigma generic and open signature format.☆77Updated 2 years ago
- ☆85Updated 9 months ago
- pySigma Splunk backend☆34Updated 7 months ago
- This repository contains sample log data that were collected after running adversary simulations in Microsoft 365☆20Updated last month
- Web app that provides basic navigation and annotation of ATT&CK matrices☆16Updated 4 years ago
- My conference presentations☆66Updated last year
- ☆23Updated 2 years ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆66Updated last week
- Memory Baseliner is a script that can compare two windows memory images or perform frequency of occurrence / data stacking analysis on mu…☆49Updated last year
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆65Updated 8 months ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 2 years ago
- Repository for SPEED SIEM Use Case Framework☆52Updated 4 years ago