svch0stz / TheThreatHuntLibrary
Library of threat hunts to get any user started!
☆40Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for TheThreatHuntLibrary
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆35Updated 11 months ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆44Updated 2 years ago
- Automated detection rule analysis utility☆29Updated 2 years ago
- Repository for SPEED SIEM Use Case Framework☆52Updated 4 years ago
- Sigma detection rules for hunting with the threathunting-keywords project☆47Updated 3 weeks ago
- A home for detection content developed by the delivr.to team☆59Updated last week
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆58Updated last year
- Full of public notes and Utilities☆87Updated last week
- ☆17Updated last year
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆56Updated last week
- Random notes collected on the intertubes relating to DFIR☆32Updated last year
- Automatic detection engineering technical state compliance☆51Updated 4 months ago
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 3 years ago
- ☆29Updated 3 years ago
- ☆18Updated 2 years ago
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆18Updated last year
- Cyber Threats Detection Rules☆13Updated 2 months ago
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆57Updated 6 months ago
- ☆85Updated 9 months ago
- This repository contains sample log data that were collected after running adversary simulations in Microsoft 365☆20Updated last month
- ☆31Updated last month
- Azure function to insert MISP data in to Azure Sentinel☆30Updated 2 years ago
- Power-Forensics is the Best Friend for Incident Responders to perform IR and collect evidences for Linux based host☆10Updated last year
- Threat Detection & Anomaly Detection rules for popular open-source components☆50Updated 2 years ago
- simple webapp for converting sigma rules into siem queries using the pySigma library☆47Updated last year
- User Feedback Space of #MitreAssistant☆37Updated last year
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆65Updated 8 months ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆65Updated this week