the2dl / SSDT
Stupid Simple Detection Testing
☆12Updated 11 months ago
Alternatives and similar repositories for SSDT:
Users that are interested in SSDT are comparing it to the libraries listed below
- This repository contains sample log data that were collected after running adversary simulations in Microsoft 365☆20Updated 4 months ago
- Sigma detection rules for hunting with the threathunting-keywords project☆53Updated 3 weeks ago
- A home for detection content developed by the delivr.to team☆67Updated 2 weeks ago
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆25Updated 7 months ago
- Open Threat-Informed Detection Engineering☆37Updated last month
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 3 years ago
- ShellSweeping the evil.☆52Updated 8 months ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆37Updated last year
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆35Updated this week
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆76Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆50Updated last year
- simple webapp for converting sigma rules into siem queries using the pySigma library☆47Updated last year
- Baseline a Windows System against LOLBAS☆25Updated 9 months ago
- Automatic detection engineering technical state compliance☆54Updated 7 months ago
- pySigma Splunk backend☆36Updated this week
- The core backend server handling API requests and task management☆35Updated last week
- ☆41Updated 10 months ago
- Placeholder for my detection repo and misc detection engineering content☆42Updated last year
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆21Updated 2 years ago
- Library of threat hunts to get any user started!☆42Updated 4 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- ☆10Updated 6 months ago
- Repository that contains a set of purposefully erroneous Yara rules.☆49Updated last year
- Open-source Fabric templates for cybersecurity and compliance☆15Updated last month
- Linux #rootkit and #malware revealer☆23Updated 6 months ago
- ☆16Updated 2 months ago
- Living off the False Positive!☆33Updated 3 weeks ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆22Updated last week
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago