threat-punter / community-contributions
A collection of my presentations, blog posts, and other contributions to the information security community
☆24Updated last week
Related projects: ⓘ
- Repository for SPEED SIEM Use Case Framework☆52Updated 4 years ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆57Updated last year
- Library of threat hunts to get any user started!☆40Updated 4 years ago
- Searches for Insider Threat Hunting☆30Updated 5 years ago
- The project was moved here https://github.com/atomic-threat-coverage/atomic-threat-coverage☆23Updated 5 years ago
- Sharing Threat Hunting runbooks☆24Updated 5 years ago
- Supporting material for my presentation "Adversarial Threat Modelling — A Practical Approach to Purple Teaming in the Enterprise"☆50Updated 2 years ago
- Cloud Templates and scripts to deploy mordor environments☆127Updated 3 years ago
- Recon Hunt Queries☆76Updated 3 years ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆16Updated 3 years ago
- Notes from my "Implementing a Kick-Butt Training Program: Blue Team GO!" talk☆12Updated 5 years ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆37Updated last year
- pocket guide for core threat hunting concepts☆23Updated 4 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆102Updated last year
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆51Updated 2 years ago
- Microsoft GPO Readiness Lateral Movement Detection Tool☆15Updated last year
- A collection of useful PowerShell tools to collect, organize, and visualize Sysmon event data☆40Updated 4 years ago
- Automatic detection engineering technical state compliance☆49Updated 2 months ago
- Automated detection rule analysis utility☆29Updated last year
- A community event for security researchers to share their favorite notebooks☆105Updated 7 months ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆44Updated 2 years ago
- A completely unsupported set of scripts used in SANS FOR572, Advanced Network Forensics and Analysis☆22Updated 2 months ago
- incident response scripts☆18Updated 5 years ago
- CSIRT Jump Bag☆26Updated 4 months ago
- Three datasets to practice Threat Hunting against.☆36Updated 8 months ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆51Updated 3 years ago
- attack2jira automates the process of standing up a Jira environment that can be used to track and measure ATT&CK coverage☆110Updated last year
- Expert Investigation Guides☆50Updated 3 years ago
- Threat Hunter's Knowledge Base☆21Updated 2 years ago
- ☆28Updated 3 years ago