wagga40 / Mitre2Datatables
Bring Your Own Mitre Att&ck © Matrix !
☆13Updated last year
Alternatives and similar repositories for Mitre2Datatables:
Users that are interested in Mitre2Datatables are comparing it to the libraries listed below
- Sigma rules converted for direct use with Zircolite☆13Updated this week
- Documentation site for Velociraptor☆45Updated this week
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆37Updated last month
- Logbook for Digital Forensics and Incident Response☆50Updated 9 months ago
- A collection of tips for using MISP.☆74Updated 4 months ago
- ☆34Updated 6 months ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆38Updated last year
- Remote access and Antivirus Logging Database☆42Updated 11 months ago
- pySigma Splunk backend☆38Updated 2 months ago
- ☆18Updated 2 years ago
- Library of threat hunts to get any user started!☆44Updated 4 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆22Updated 3 years ago
- Incident Response Network Tools☆24Updated 3 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- User Feedback Space of #MitreAssistant☆37Updated last year
- CSIRT Jump Bag☆26Updated last year
- Hunt for SQLite files used by various applications☆24Updated last month
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆40Updated last year
- ☆51Updated 11 months ago
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆19Updated last year
- Threat Detection & Anomaly Detection rules for popular open-source components☆51Updated 2 years ago
- ☆19Updated 2 years ago
- Sigma detection rules for hunting with the threathunting-keywords project☆55Updated last month
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆76Updated last year
- ☆72Updated 6 months ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated last year
- Repository for SPEED SIEM Use Case Framework☆53Updated 4 years ago
- ☆6Updated 6 months ago
- ☆25Updated 3 weeks ago
- Various PowerShells scripts I've made (or others have made) to automate some of the boring stuff in my everyday DFIR journey!☆45Updated 6 months ago