wagov / wasocsharedLinks
WA Cyber Security Unit (DGOV Technical) site
☆37Updated this week
Alternatives and similar repositories for wasocshared
Users that are interested in wasocshared are comparing it to the libraries listed below
Sorting:
- ☆85Updated 3 months ago
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 7 months ago
- This code snippet retrieves Azure Sentinel rules that are mapped to MITRE ATT&CK Framework and generates the related MITRE D3FEND defense…☆71Updated 3 years ago
- A collection of ARM-based detections for Azure/AzureAD based TTPs☆88Updated last year
- CrowdStrike's Open Source Policy & Contribution Guide☆40Updated 2 months ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆112Updated 7 months ago
- Security Scripts and Sources for daily usage.☆61Updated 2 weeks ago
- A self assessment tool to help understand your level in the SANS Vulnerability Management Maturity Model (VMMM).☆39Updated 3 months ago
- A preconfigured Velociraptor triage collector☆52Updated last week
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆107Updated 8 months ago
- ☆41Updated 6 months ago
- ☆132Updated last month
- ☆45Updated 2 years ago
- Unleash the power of the Falcon Platform at the CLI☆119Updated this week
- Anvilogic Forge☆104Updated 2 weeks ago
- ☆95Updated 2 years ago
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs☆55Updated last year
- ☆99Updated 3 months ago
- Microsoft 365 Advanced Hunting Queries with hotlinks that plug the query right into your tenant.☆124Updated this week
- MISP to Sentinel integration☆68Updated last week
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆162Updated 3 months ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆41Updated last month
- A collection of various SIEM rules relating to malware family groups.☆66Updated last year
- An opensource sigma conversion tool built using pysigma☆130Updated last week
- Powershell Based tool for gathering information related to O365 intrusions and potential Breaches☆14Updated 5 months ago
- Notes on responding to security breaches relating to Azure AD☆112Updated 3 years ago
- InsightVM helpful SQL queries☆64Updated 4 months ago
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆134Updated last year
- The Infosec Community Definitive Guide to Jupyter Notebooks☆122Updated 4 years ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Updated 3 years ago