petebryan / blue_team_con
☆17Updated 2 years ago
Alternatives and similar repositories for blue_team_con
Users that are interested in blue_team_con are comparing it to the libraries listed below
Sorting:
- ☆47Updated last month
- ☆72Updated 6 months ago
- ☆41Updated 3 years ago
- ☆41Updated 2 years ago
- Random tips and tricks RE: ransomware☆14Updated 3 years ago
- Jupyter notebooks☆25Updated 4 years ago
- Azure function to insert MISP data in to Azure Sentinel☆32Updated 2 years ago
- This repository is used by FalconForce to release parts of the internal tools used for maintaining, validating and automatically deployin…☆16Updated 2 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆36Updated last year
- Hunting Queries for Microsoft Defender Security Center https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defe…☆39Updated 4 years ago
- A preconfigured Windows-based system designed for rapid forensic investigations in both Azure and AWS.☆39Updated last year
- Collection of scripts/resources/ideas for attack surface reduction and additional logging to enable better threat hunting on Windows endp…☆38Updated last year
- A WDAC configuration repository with the sole intention of enriching MDE☆28Updated 2 years ago
- A project that aims to automate Volatility3 at scale with the use of cloud strength and the power of KQL inside ADX.☆16Updated 5 months ago
- Ingesting Shodan Monitor Alerts to Microsoft Sentinel☆34Updated last year
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆19Updated last year
- The idea is simply to save some quick notes that will make it easier for Splunk users to leverage KQL (Kusto), especially giving projects…☆42Updated 4 years ago
- ☆32Updated 3 years ago
- ☆14Updated 4 years ago
- Repository for SPEED SIEM Use Case Framework☆53Updated 5 years ago
- ☆11Updated 2 years ago
- The ultimate repository for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆23Updated 2 weeks ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Updated 3 months ago
- List of custom developed KQL queries to help proactive security teams hunt for opportunistic and sophisticated threat activity by develop…☆26Updated 3 years ago
- ESXi Cyber Security Incident Response Script☆24Updated 8 months ago
- ☆29Updated 4 years ago
- Microsoft GPO Readiness Lateral Movement Detection Tool☆16Updated 2 years ago
- ☆21Updated 2 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 3 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago