refractionPOINT / rules
Public rules and samples for various automations through LimaCharlie.io
☆11Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for rules
- SilkETW & SilkService☆39Updated 5 years ago
- A PowerShell tool which provides an easy way to check for shared passwords between Windows Active Directory accounts☆33Updated 5 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆22Updated last year
- Detect kerberos attacks in pcap files☆27Updated 8 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 5 years ago
- Scripts to help hunt for possible golden/silver TGT tickets☆16Updated 7 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆15Updated 3 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- OSSEM Modular☆27Updated 4 years ago
- ☆27Updated 6 years ago
- This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.☆33Updated 5 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Sysmon config for both Windows and Linux Devices. Windows one is a bit dated☆54Updated 4 months ago
- Historical Observations of Actionable Reputation Data☆13Updated 6 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- FastIR Agent is a Windows service to execute FastIR Collector on demand☆14Updated 7 years ago
- ☆17Updated 9 years ago
- Repository for my ATT&CK analysis research.☆68Updated 5 years ago
- Presentation materials for talks I've given.☆20Updated 5 years ago
- Information about most important hunts which can be performed by Threat hunters while searching for any adversary/threats inside the orga…☆15Updated 5 years ago
- mindmap created for tools can be used during analysis/investigation☆27Updated 7 years ago
- ☆12Updated 6 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 6 years ago
- ☆14Updated 6 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆11Updated 3 years ago