weslambert / DinoSOARLab
Security Onion + Automation + Response Lab including n8n and Velociraptor
☆108Updated 2 years ago
Alternatives and similar repositories for DinoSOARLab:
Users that are interested in DinoSOARLab are comparing it to the libraries listed below
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- Docker image for Velocidex Velociraptor☆123Updated last month
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆133Updated 2 years ago
- ☆51Updated 11 months ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆149Updated last month
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated last year
- Convert Sigma rules to LogRhythm searches☆21Updated 3 years ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆114Updated last year
- Resources To Learn And Understand SIGMA Rules☆174Updated 2 years ago
- Full of public notes and Utilities☆98Updated 2 months ago
- ☆57Updated last year
- This repository contains Splunk queries to hunt some anomalies☆41Updated 2 years ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆92Updated 3 years ago
- Technical add-on for Splunk related to TheHive/Cortex from TheHive project☆53Updated 3 weeks ago
- Python library for threat intelligence☆86Updated 3 months ago
- Repository for SPEED SIEM Use Case Framework☆53Updated 4 years ago
- ☆42Updated 2 years ago
- Some Threat Hunting queries useful for blue teamers☆125Updated 2 years ago
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆77Updated 10 months ago
- Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations☆84Updated 8 months ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆118Updated last year
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆61Updated 11 months ago
- This repo is where I store my Threat Hunting ideas/content☆87Updated last year
- A PowerShell incident response script for quick triage☆80Updated 2 years ago
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆132Updated last year
- Threat Hunting & Incident Investigation with Osquery☆207Updated 3 years ago
- ☆6Updated 5 months ago
- SentinelOne STAR Rules☆59Updated 2 months ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆55Updated 3 years ago
- Tools for simulating threats☆183Updated last year