svch0stz / TheThreatHuntLibrary
Library of threat hunts to get any user started!
☆41Updated 4 years ago
Alternatives and similar repositories for TheThreatHuntLibrary:
Users that are interested in TheThreatHuntLibrary are comparing it to the libraries listed below
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆44Updated 3 years ago
- Sigma detection rules for hunting with the threathunting-keywords project☆52Updated this week
- Cyber Threats Detection Rules☆14Updated 3 weeks ago
- Script to automate Linux live evidence collection☆27Updated 2 years ago
- Random notes collected on the intertubes relating to DFIR☆32Updated last year
- ☆30Updated 3 years ago
- ☆85Updated 11 months ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆36Updated last year
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆60Updated 2 years ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆75Updated last year
- ☆20Updated 2 years ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- A repo for centralizing ongoing research on the new Windows 10/11 DFIR artifact, EventTranscript.db.☆39Updated 2 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 3 years ago
- ShellSweeping the evil.☆52Updated 7 months ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆65Updated 10 months ago
- User Feedback Space of #MitreAssistant☆37Updated last year
- Automatic detection engineering technical state compliance☆53Updated 6 months ago
- ☆32Updated 3 months ago
- This repository contains sample log data that were collected after running adversary simulations in Microsoft 365☆20Updated 3 months ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆57Updated 2 weeks ago
- Get-MiniTimeline - Triage Collection and Timeline Generation w/ KAPE☆28Updated 8 months ago
- Automated detection rule analysis utility☆29Updated 2 years ago
- A home for detection content developed by the delivr.to team☆64Updated last week
- Rhaegal is a tool written in Python 3 used to scan Windows Event Logs for suspicious logs. Rhaegal uses custom rule format to detect sus…☆39Updated last year
- Repository for SPEED SIEM Use Case Framework☆52Updated 4 years ago
- simple webapp for converting sigma rules into siem queries using the pySigma library☆47Updated last year
- Security Content for the PEAK Threat Hunting Framework☆24Updated 11 months ago
- ☆21Updated 3 years ago
- Sigma Detection Rule Repository☆86Updated 4 years ago