wagga40 / Mitre2DatatablesLinks
Bring Your Own Mitre Att&ck © Matrix !
☆13Updated last year
Alternatives and similar repositories for Mitre2Datatables
Users that are interested in Mitre2Datatables are comparing it to the libraries listed below
Sorting:
- Sigma rules converted for direct use with Zircolite☆13Updated this week
- pySigma Splunk backend☆38Updated 3 weeks ago
- Library of threat hunts to get any user started!☆44Updated 4 years ago
- Documentation site for Velociraptor☆46Updated last week
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆34Updated 3 years ago
- A collection of tips for using MISP.☆74Updated 5 months ago
- Various PowerShells scripts I've made (or others have made) to automate some of the boring stuff in my everyday DFIR journey!☆46Updated 8 months ago
- A script to collect (the most famous) Yara rules from more than 150 free resources. Free alternative to: https://valhalla.nextron-system…☆27Updated last year
- ☆34Updated 7 months ago
- Incident Response Report Using GitHub-Sphinx☆20Updated 5 years ago
- User Feedback Space of #MitreAssistant☆37Updated 2 years ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆67Updated last year
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆41Updated 3 weeks ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆78Updated 3 weeks ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆38Updated last year
- DNS Dashboard for hunting and identifying beaconing☆16Updated 4 years ago
- PowerShell scripts for running Magnet RESPONSE forensic collection tool in large enterprises.☆25Updated 4 months ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆36Updated last year
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆16Updated last month
- Remote access and Antivirus Logging Database☆42Updated last year
- ☆87Updated last year
- simple webapp for converting sigma rules into siem queries using the pySigma library☆49Updated last year
- Knowing which rule should trigger according to the redcannary test☆11Updated 6 months ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆52Updated 2 years ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated last year
- Automatic detection engineering technical state compliance☆55Updated 11 months ago
- ☆13Updated 5 months ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆114Updated last year
- ☆19Updated 3 years ago