schwartz1375 / Threat-Hunting-in-AWS
☆26Updated 2 years ago
Related projects: ⓘ
- Supporting material for my presentation "Adversarial Threat Modelling — A Practical Approach to Purple Teaming in the Enterprise"☆50Updated 2 years ago
- Random tips and tricks RE: ransomware☆14Updated 3 years ago
- ☆28Updated 3 years ago
- ☆42Updated 3 months ago
- Jupyter notebooks☆22Updated 4 years ago
- ☆40Updated 5 months ago
- ☆19Updated 3 years ago
- A preconfigured Windows-based system designed for rapid forensic investigations in both Azure and AWS.☆36Updated 5 months ago
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Updated last year
- Cyber Threats Detection Rules☆13Updated last week
- ☆15Updated 3 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 3 years ago
- ☆17Updated 2 years ago
- Test case indexes☆35Updated 2 months ago
- Threat Hunter's Knowledge Base☆21Updated 2 years ago
- ☆18Updated 2 years ago
- Simple parser to get useful information from AWS S3 logs☆24Updated 3 years ago
- Identify Azure blobs using a wordlist of account name and container name strings☆31Updated 3 years ago
- ☆19Updated last year
- ☆25Updated 3 years ago
- Library of threat hunts to get any user started!☆40Updated 4 years ago
- Azure function to insert MISP data in to Azure Sentinel☆30Updated last year
- Random notes collected on the intertubes relating to DFIR☆32Updated last year
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated last year
- Threat Box Assessment Tool☆19Updated 3 years ago
- The ultimate solution for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆21Updated 3 weeks ago
- General Content☆19Updated 2 months ago
- My Jupyter Notebooks☆36Updated 5 months ago
- ☆10Updated last month
- High-level Threat Intelligence playbooks☆16Updated 3 years ago