mbower's Stars
nathanmcnulty/nathanmcnulty
splunk/attack_range
A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk
StrikeReady-Inc/research
shared IOCs and context from StrikeReady blogs
ThreatLabz/smokebuster
A tool to detect, analyze, and remediate SmokeLoader infections.
curated-intel/The-CTI-Research-Guide
A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners
deepfence/YaraHunter
🔍🔍 Malware scanner for cloud-native, as part of CI/CD and at Runtime 🔍🔍
CrowdStrike/psfalcon
PowerShell for CrowdStrike's OAuth2 APIs
nasbench/Misc-Research
A collection of tools, scripts and personal research
redcanaryco/surveyor
A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.
stivenhacker/GhostStrike
Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations.
chainguard-dev/malcontent
#supply #chain #attack #detection
mthcht/awesome-lists
Awesome Security lists for SOC/CERT/CTI
cudeso/proof-value-cti
Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.
tsale/EDR-Telemetry
This project aims to compare and evaluate the telemetry of various EDR products.
Gadzhovski/TRACE-Forensic-Toolkit
TRACE is a digital forensic analysis tool that provides a user-friendly interface for investigating disk images.
SecurityAura/DE-TH-Aura
Repository where I hold random detection and threat hunting queries that I come up with based on different sources of information (or even inspiration).
panther-labs/panther-analysis
Built-in Panther detection rules and policies
jsecurity101/JonMon
murat-exp/EDR-Antivirus-Bypass-to-Gain-Shell-Access
EDR & Antivirus Bypass to Gain Shell Access
openrelik/openrelik-server
The core backend server handling API requests and task management
SlimKQL/Hunting-Queries-Detection-Rules
KQL Queries. Microsoft Defender, Microsoft Sentinel
CrowdStrike/logscale-community-content
This repository contains Community and Field contributed content for LogScale
BushidoUK/Russian-APT-Tool-Matrix
A tool matrix for Russian APTs based on the Ransomware Tool Matrix
apophis133/apophis-YARA-Rules
Repository of yara rules and malware config extractors
wiz-sec-public/wiz-research-iocs
reecdeep/segugio
Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extracting the malware's final stage configuration.
RootUp/SmuggleShield
Basic protection against HTML smuggling attempts.
certeu/droid
A pySigma wrapper to manage detection rules.
magicsword-io/LOLDrivers
Living Off The Land Drivers
7etsuo/windows-api-function-cheatsheets
A reference of Windows API function calls, including functions for file operations, process management, memory management, thread management, dynamic-link library (DLL) management, synchronization, interprocess communication, Unicode string manipulation, error handling, Winsock networking operations, and registry operations.