tsale / EDR-Telemetry-WebsiteLinks
☆74Updated this week
Alternatives and similar repositories for EDR-Telemetry-Website
Users that are interested in EDR-Telemetry-Website are comparing it to the libraries listed below
Sorting:
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆84Updated last year
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆82Updated 8 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆125Updated last year
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆63Updated last year
- God Mode Detection Rules☆134Updated last year
- A simple tool designed to create Atomic Red Team tests with ease.☆49Updated 10 months ago
- VirtualGHOST Detection Tool☆101Updated last month
- A collection of CVEs weaponized by ransomware operators☆128Updated 2 months ago
- CarbonBlack EDR detection rules and response actions☆73Updated last year
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆151Updated 2 weeks ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆160Updated 9 months ago
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆29Updated last year
- Mapping of open-source detection rules and atomic tests.☆192Updated 11 months ago
- Baseline a Windows System against LOLBAS☆69Updated last year
- ☆28Updated 2 years ago
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆102Updated last year
- Your Browser-based EVTX Companion☆110Updated last week
- A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System inc…☆95Updated 2 months ago
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.☆51Updated 8 months ago
- MS Graph Commands and Tools for Blue Teamers☆52Updated 2 years ago
- Slides of my public talks☆56Updated 2 years ago
- Menu for Thor scanner lite☆20Updated 2 months ago
- A list of RMMs designed to be used in automation to build alerts☆117Updated 2 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆116Updated last year
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆143Updated 3 weeks ago
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆35Updated 9 months ago
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆179Updated 7 months ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆50Updated last week
- A collection of various SIEM rules relating to malware family groups.☆70Updated last year
- Audits an AppLocker policy XML and reports weak/misconfigured/risky settings, including actual ACL checks.☆130Updated 4 months ago