wagov / wasocsharedLinks
WA Cyber Security Unit (DGOV Technical) site
☆39Updated this week
Alternatives and similar repositories for wasocshared
Users that are interested in wasocshared are comparing it to the libraries listed below
Sorting:
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 9 months ago
- ☆86Updated 4 months ago
- MISP to Sentinel integration☆69Updated 2 weeks ago
- Dettectinator - The Python library to your DeTT&CT YAML files.☆115Updated 3 months ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆128Updated last year
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs☆55Updated 2 years ago
- Security Scripts and Sources for daily usage.☆64Updated last month
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆112Updated 8 months ago
- Microsoft 365 Advanced Hunting Queries with hotlinks that plug the query right into your tenant.☆126Updated last month
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆165Updated 5 months ago
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆155Updated 5 months ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆122Updated 4 years ago
- A collection of ARM-based detections for Azure/AzureAD based TTPs☆88Updated last year
- Tool to extract Sessions, MessageID(s) and find the emails belonging to MessageID(s). This script utilizes the MailItemsAccessed features…☆41Updated 4 years ago
- ☆45Updated 2 years ago
- CrowdStrike's Open Source Policy & Contribution Guide☆43Updated 4 months ago
- Cybersecurity Incident Response Plan☆91Updated 4 years ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆261Updated 4 months ago
- A collection of various SIEM rules relating to malware family groups.☆67Updated last year
- The Office 365 Extractor is a tool that allows for complete and reliable extraction of the Unified Audit Log (UAL)☆264Updated 3 years ago
- MISP Playbooks☆206Updated last month
- ☆101Updated last month
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆108Updated 9 months ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆47Updated 2 months ago
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆143Updated 3 weeks ago
- SentinelOne STAR Rules☆65Updated 5 months ago
- ☆73Updated 9 months ago
- Automating Security Detection Engineering, published by Packt☆60Updated 9 months ago
- ☆95Updated 2 years ago
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆136Updated last year