schwartz1375 / Threat-Hunting-in-AWS
☆27Updated 2 years ago
Alternatives and similar repositories for Threat-Hunting-in-AWS:
Users that are interested in Threat-Hunting-in-AWS are comparing it to the libraries listed below
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆57Updated 2 weeks ago
- ☆45Updated 3 weeks ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 3 years ago
- Random tips and tricks RE: ransomware☆14Updated 3 years ago
- ☆19Updated 3 years ago
- Threat Box Assessment Tool☆19Updated 3 years ago
- My Jupyter Notebooks☆36Updated 9 months ago
- ☆28Updated 4 years ago
- ☆15Updated 4 years ago
- Repository for SPEED SIEM Use Case Framework☆52Updated 4 years ago
- Random notes collected on the intertubes relating to DFIR☆32Updated last year
- CSIRT Jump Bag☆27Updated 9 months ago
- ☆18Updated 3 years ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- A completely unsupported set of scripts used in SANS FOR572, Advanced Network Forensics and Analysis☆25Updated last month
- SigmaHQ pySigma CrowdStrike processing pipeline☆21Updated 3 months ago
- Cyber Threats Detection Rules☆14Updated 3 weeks ago
- The ultimate solution for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆22Updated 5 months ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆36Updated last year
- A preconfigured Windows-based system designed for rapid forensic investigations in both Azure and AWS.☆37Updated 10 months ago
- Machine Interrogation To Identify Gaps & Techniques for Execution☆32Updated 2 years ago
- Projects for AWS ThreatHunting☆21Updated 3 years ago
- ☆20Updated 5 years ago
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆18Updated 2 years ago
- Hunting Malicious Macros SANS Threathunting Summit 2021 Materials☆40Updated 3 years ago
- Library of threat hunts to get any user started!☆41Updated 4 years ago
- ☆41Updated 9 months ago
- Jupyter notebooks☆22Updated 4 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 3 years ago
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Updated last year