the2dl / chronicle_detection_public
Public Chronicle Detection Rules
☆12Updated last year
Alternatives and similar repositories for chronicle_detection_public:
Users that are interested in chronicle_detection_public are comparing it to the libraries listed below
- ShellSweeping the evil.☆52Updated 8 months ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Updated 2 weeks ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated last year
- PS-TrustedDocuments: PowerShell script to handle information on trusted documents for Microsoft Office☆34Updated last year
- ☆20Updated last year
- Threat Box Assessment Tool☆19Updated 3 years ago
- Security Content for the PEAK Threat Hunting Framework☆26Updated last year
- ☆15Updated 4 years ago
- Placeholder for my detection repo and misc detection engineering content☆42Updated last year
- A project that aims to automate Volatility3 at scale with the use of cloud strength and the power of KQL inside ADX.☆16Updated 2 months ago
- Jupyter Notebooks for Cyber Threat Intelligence☆36Updated last year
- Azure function to insert MISP data in to Azure Sentinel☆31Updated 2 years ago
- Remote access and Antivirus Logging Database☆43Updated 9 months ago
- Python library to query various sources of threat intelligence for data on domains, file hashes, and IP addresses.☆31Updated last year
- Scripts and lists to help generate YARA friendly string mutations☆20Updated last year
- ☆41Updated 10 months ago
- ☆20Updated 2 years ago
- Random tips and tricks RE: ransomware☆14Updated 3 years ago
- Logbook for Digital Forensics and Incident Response☆50Updated 7 months ago
- ☆23Updated 2 years ago
- A repo for centralizing ongoing research on the new Windows 10/11 DFIR artifact, EventTranscript.db.☆39Updated 2 years ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆76Updated last year
- Cyber Threats Detection Rules☆14Updated last month
- ☆18Updated 2 years ago
- Powershell sandboxing utility☆18Updated this week
- Generate YARA rules for OOXML documents.☆38Updated last year
- ☆33Updated 2 years ago
- This repository contains sample log data that were collected after running adversary simulations in Microsoft 365☆20Updated 4 months ago