schwartz1375 / Threat-Hunting-in-AWS
☆27Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Threat-Hunting-in-AWS
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆56Updated last week
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆9Updated 3 years ago
- The ultimate solution for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆22Updated 3 months ago
- Track progress and keep notes while working through likethecoins' CTI Self Study Plan☆28Updated 2 years ago
- ☆15Updated 3 years ago
- Random tips and tricks RE: ransomware☆14Updated 3 years ago
- ☆43Updated last month
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆35Updated 11 months ago
- ☆19Updated 3 years ago
- ☆17Updated 2 years ago
- High-level Threat Intelligence playbooks☆16Updated 3 years ago
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Updated last year
- ☆28Updated 4 years ago
- A preconfigured Windows-based system designed for rapid forensic investigations in both Azure and AWS.☆36Updated 7 months ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- Automated detection rule analysis utility☆29Updated 2 years ago
- ☆10Updated 3 months ago
- Simple parser to get useful information from AWS S3 logs☆24Updated 3 years ago
- ☆41Updated 7 months ago
- ReWrite of AChoir in Go for Cross Platform☆35Updated last week
- Hunting Malicious Macros SANS Threathunting Summit 2021 Materials☆40Updated 3 years ago
- ☆19Updated last year
- Library of threat hunts to get any user started!☆40Updated 4 years ago
- Cyber Threats Detection Rules☆13Updated 2 months ago
- ☆133Updated last year
- Sigma detection rules for hunting with the threathunting-keywords project☆47Updated 2 weeks ago
- Threat Box Assessment Tool☆19Updated 3 years ago
- simple webapp for converting sigma rules into siem queries using the pySigma library☆47Updated last year
- ☆25Updated 3 years ago
- A home for detection content developed by the delivr.to team☆59Updated last week