st0pp3r / awesome-detection-engineerLinks
Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools, logging configuration and best practices, event log references, resources, labs, data manipulation online tools, blogs, newsletters, good reads, books, trainings, podcasts, videos and twitter/x accounts.
☆116Updated last week
Alternatives and similar repositories for awesome-detection-engineer
Users that are interested in awesome-detection-engineer are comparing it to the libraries listed below
Sorting:
- Mapping of open-source detection rules and atomic tests.☆176Updated 7 months ago
- A collection of various SIEM rules relating to malware family groups.☆69Updated last year
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆106Updated 10 months ago
- ☆115Updated 3 months ago
- CarbonBlack EDR detection rules and response actions☆71Updated last year
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆157Updated 5 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆125Updated last year
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆27Updated 9 months ago
- Finding ClickFix and FakeCAPTCHA like it's 1999☆57Updated last week
- ☆74Updated last week
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆28Updated 5 months ago
- The ultimate repository for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆24Updated last month
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆52Updated 10 months ago
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.☆48Updated 4 months ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆78Updated 4 months ago
- Hunting Queries for Defender ATP☆82Updated 4 months ago
- A collection of CVEs weaponized by ransomware operators☆122Updated 3 weeks ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆82Updated last year
- A starter pack of resources to help you get started in Detection Engineering.☆172Updated 2 weeks ago
- AI-powered cybersecurity attack flow visualization tool using MITRE ATT&CK☆67Updated last week
- Slides of my public talks☆56Updated last year
- An index of publicly available and open-source threat detection rulesets.☆124Updated 4 months ago
- MISP Playbooks☆207Updated 3 months ago
- Sigma detection rules for hunting with the threathunting-keywords project☆56Updated 6 months ago
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆89Updated last year
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆190Updated 8 months ago
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?☆57Updated 2 months ago
- VirtualGHOST Detection Tool☆92Updated last year
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆147Updated last week
- A preconfigured Velociraptor triage collector☆55Updated this week