tsale / Intrusion_dataLinks
This repository is created to store the artifacts for any intrusions I share publicly.
☆26Updated last year
Alternatives and similar repositories for Intrusion_data
Users that are interested in Intrusion_data are comparing it to the libraries listed below
Sorting:
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆38Updated last year
- ESXi Cyber Security Incident Response Script☆23Updated 9 months ago
- ☆22Updated 2 years ago
- Tools and scripts to deploy and manage OpenRelik instances☆14Updated last week
- Sigma detection rules for hunting with the threathunting-keywords project☆55Updated 3 months ago
- Remote access and Antivirus Logging Database☆42Updated last year
- VelociraptorMCP is a Model Context Protocol bridge for exposing LLMs to MCP clients.☆36Updated last week
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆26Updated 7 months ago
- Azure function to insert MISP data in to Azure Sentinel☆32Updated 2 years ago
- ShellSweeping the evil.☆52Updated last year
- This repository contains sample log data that were collected after running adversary simulations in Microsoft 365☆21Updated 8 months ago
- ☆47Updated 2 months ago
- Placeholder for my detection repo and misc detection engineering content☆42Updated last year
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆79Updated last month
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆41Updated last month
- The ultimate repository for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆24Updated 3 weeks ago
- A collection of Sigma rules organized by MITRE ATT&CK technique☆17Updated 3 years ago
- VTC - Velociraptor Timeline Creator☆18Updated last year
- CarbonBlack EDR detection rules and response actions☆71Updated 9 months ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Updated 4 months ago
- ☆23Updated 3 years ago
- Notes from my "Implementing a Kick-Butt Training Program: Blue Team GO!" talk☆12Updated 6 years ago
- Baseline a Windows System against LOLBAS☆27Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆52Updated 6 months ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆52Updated last year
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆25Updated 3 months ago
- Quick ESXi Log Parser☆21Updated 5 months ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆48Updated last year
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆34Updated 2 months ago