webpro255 / Windows-Sysmon-Threat-Hunting-GuideLinks
A resource for leveraging Windows and Sysmon event codes in threat hunting and incident response.
☆24Updated last year
Alternatives and similar repositories for Windows-Sysmon-Threat-Hunting-Guide
Users that are interested in Windows-Sysmon-Threat-Hunting-Guide are comparing it to the libraries listed below
Sorting:
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆27Updated 10 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆55Updated last year
- A simple tool designed to create Atomic Red Team tests with ease.☆49Updated 11 months ago
- create a "simulated internet" cyber range environment☆19Updated 2 weeks ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Updated 7 months ago
- Detonate malware on VMs and get logs & detection status☆76Updated 2 weeks ago
- Detection rule validation☆40Updated 2 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆53Updated 2 years ago
- ☆11Updated 2 years ago
- Placeholder for my detection repo and misc detection engineering content☆42Updated 2 years ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆33Updated last year
- Baseline a Windows System against LOLBAS☆70Updated last week
- Bloodhound Portable for Windows☆53Updated 2 years ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆83Updated last year
- A little tool to filter the stranger strings from a binary so you can analyze the good ones☆52Updated 5 months ago
- Contains compiled binaries of Volatility☆37Updated 8 months ago
- MS Graph Commands and Tools for Blue Teamers☆52Updated last week
- A not-curated list of cloud hacking labs☆26Updated last year
- ☆84Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Updated 2 years ago
- SQL, IIS, Oh My...☆22Updated 11 months ago
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆76Updated last month
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27Updated 9 months ago
- information about ransomware groups (Ransomware Analysis Notes)☆41Updated 2 years ago
- These FLARE-VM configuration files are designed to be help setup a purpose-built installation, remove unnecessary packages to help stream…☆15Updated last year
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆11Updated 5 months ago
- Yara Rules for Modern Malware☆78Updated last year
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆44Updated last year
- A home for detection content developed by the delivr.to team☆73Updated 6 months ago
- ☆25Updated 2 years ago