wagga40 / Mitre2DatatablesLinks
Bring Your Own Mitre Att&ck © Matrix !
☆13Updated last year
Alternatives and similar repositories for Mitre2Datatables
Users that are interested in Mitre2Datatables are comparing it to the libraries listed below
Sorting:
- Sigma rules converted for direct use with Zircolite☆13Updated this week
- Documentation site for Velociraptor☆50Updated last week
- pySigma Splunk backend☆41Updated 2 months ago
- A collection of tips for using MISP.☆74Updated 7 months ago
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆34Updated 3 years ago
- Library of threat hunts to get any user started!☆44Updated 4 years ago
- Sigma detection rules for hunting with the threathunting-keywords project☆56Updated 5 months ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆25Updated last year
- A script to collect (the most famous) Yara rules from more than 150 free resources. Free alternative to: https://valhalla.nextron-system…☆27Updated last year
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆30Updated 3 weeks ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆65Updated 2 years ago
- PowerShell scripts for running Magnet RESPONSE forensic collection tool in large enterprises.☆26Updated 7 months ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆80Updated 2 months ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆35Updated 3 months ago
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated last month
- Digital Forensics Artifacts Knowledge Base☆84Updated last year
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆66Updated last year
- Remote access and Antivirus Logging Database☆42Updated last year
- Incident Response Network Tools☆24Updated 4 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆45Updated 3 years ago
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆21Updated last year
- simple webapp for converting sigma rules into siem queries using the pySigma library☆50Updated last year
- The core backend server handling API requests and task management☆43Updated this week
- ☆19Updated 3 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 4 years ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated last year
- ☆22Updated 2 years ago
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆16Updated 3 months ago
- ☆69Updated 5 months ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆47Updated 2 months ago