panther-labs / panther-analysis
Built-in Panther detection rules and policies
☆379Updated this week
Alternatives and similar repositories for panther-analysis:
Users that are interested in panther-analysis are comparing it to the libraries listed below
- Dorothy is a tool to test security monitoring and detection for Okta environments☆182Updated 9 months ago
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆386Updated last year
- ☆386Updated last year
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆329Updated last week
- Collection of example YARA-L rules for use within Google Security Operations☆388Updated this week
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆276Updated last year
- ☆371Updated last year
- A knowledge base of actionable Incident Response techniques☆636Updated 2 years ago
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆186Updated 8 months ago
- Open Cloud Security Posture Management Engine☆339Updated 3 years ago
- Python library to carry out DFIR analysis on the Cloud☆477Updated last month
- Documenting your Threat Models with HCL☆426Updated this week
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆159Updated last week
- The SOCless automation framework☆139Updated 2 months ago
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆143Updated 8 months ago
- Graph-based security analysis for everyone☆345Updated last year
- OCSF Schema☆680Updated this week
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆567Updated 5 months ago
- Python installable command line utiltity for mitigation of host and key compromises.☆346Updated 3 years ago
- OCSF Documentation☆129Updated this week
- Sublime rules for email attack detection, prevention, and threat hunting.☆306Updated this week
- Released at Black Hat Asia on April 18, 2024, Cloud Console Cartographer is a framework for condensing groupings of cloud events (e.g. Cl…☆164Updated 11 months ago
- Substation is a toolkit for routing, normalizing, and enriching security event and audit logs.☆363Updated 2 months ago
- A repository of curated datasets from various attacks☆646Updated this week
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆607Updated last month
- A framework for developing alerting and detection strategies for incident response.☆737Updated 3 years ago
- Cyber Incident Response Team Playbook Battle Cards☆375Updated last year
- This content is analysis and research of the data sources currently listed in ATT&CK.☆409Updated last year
- 🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept…☆492Updated last year
- A Software as a Service (SaaS) log collection framework.☆168Updated last week