redcanaryco / vscode-attack
Visual Studio Code extension for MITRE ATT&CK
☆52Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for vscode-attack
- A community event for security researchers to share their favorite notebooks☆106Updated 9 months ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 2 years ago
- pollen - A command-line tool for interacting with TheHive☆34Updated 5 years ago
- Automatic detection engineering technical state compliance☆51Updated 4 months ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 2 years ago
- Python library for threat intelligence☆80Updated 4 months ago
- Simple yara rule manager☆65Updated last year
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆52Updated 2 years ago
- Powershell Scripts to work on Crowdstrike Falcon that pull back raw data relevant to forensic investigation☆22Updated 3 months ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆88Updated 2 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 3 years ago
- A YARA Rule Performance Measurement Tool☆58Updated 8 months ago
- OSSEM Common Data Model☆54Updated 2 years ago
- CSIRT Jump Bag☆27Updated 6 months ago
- Recon Hunt Queries☆75Updated 3 years ago
- A few quick recipes for those that do not have much time during the day☆21Updated 3 weeks ago
- My conference presentations☆66Updated last year
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 3 years ago
- Yara Based Detection Engine for web browsers☆47Updated 3 years ago
- Import specific data sources into the Sigma generic and open signature format.☆77Updated 2 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 2 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆37Updated 3 years ago
- ☆31Updated last month
- A lab environment for learning about MSTICPy☆36Updated last year
- A MITRE ATT&CK Lookup Tool☆44Updated 6 months ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆58Updated last year
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆25Updated 4 years ago