rapid7 / insightvm-sql-queries
InsightVM helpful SQL queries
☆62Updated last month
Alternatives and similar repositories for insightvm-sql-queries:
Users that are interested in insightvm-sql-queries are comparing it to the libraries listed below
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆113Updated 3 months ago
- Tools for simulating threats☆180Updated last year
- Conference presentations☆47Updated last year
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆128Updated 2 years ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆122Updated 2 weeks ago
- Repository of SentinelOne Deep Visibility queries.☆120Updated 3 years ago
- Scripts for rapid Windows endpoint "tactical triage" and investigations with Velociraptor and KAPE☆108Updated this week
- A list of Splunk queries that I've collected and used over time.☆74Updated 4 years ago
- Repository of attack and defensive information for Business Email Compromise investigations☆237Updated last month
- A port of BHIS's Backdoors & Breaches for playingcards.io☆61Updated last year
- Repository of public reference frameworks for the DFIR community.☆109Updated last year
- ☆42Updated 2 years ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆67Updated 4 years ago
- A collection of Splunk's Search Processing Language (SPL) for Threat Hunting with CrowdStrike Falcon☆195Updated 4 years ago
- ☆53Updated last year
- Real-time Response scripts and schema☆107Updated last year
- ☆79Updated 2 months ago
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆75Updated 7 months ago
- ☆73Updated last year
- Cybersecurity Incident Response Plan☆88Updated 4 years ago
- ☆55Updated 3 years ago
- MISP to Sentinel integration☆62Updated last month
- Backdoors & Breaches: Campaigns. These are short guides to help Incident Captains by giving them game ideas based on actual breaches.☆34Updated last year
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆170Updated this week
- Some Threat Hunting queries useful for blue teamers☆123Updated 2 years ago
- ☆82Updated last week
- ☆41Updated 7 months ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆115Updated last year
- SentinelOne STAR Rules☆52Updated last year