AIMOD2
ThreatHunting-Keywords
AIMOD2 | ThreatHunting-Keywords | |
---|---|---|
2 | 1 | |
84 | 344 | |
- | - | |
5.4 | 9.4 | |
8 months ago | 5 days ago | |
HTML | HTML | |
GNU General Public License v3.0 or later | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
AIMOD2
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proactively identify, engage and prevent cyber threats denying or mitigating potential damage to the organization.
- AIMOD2: Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proactively identify, engage and prevent cyber threats denying or mitigating potential damage to the organization.
ThreatHunting-Keywords
-
List of offensive tools keywords for ThreatHunting
more information here: https://github.com/mthcht/ThreatHunting-Keywords
What are some alternatives?
securityonion - Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, and case management. It also includes other tools such as Playbook, osquery, CyberChef, Elasticsearch, Logstash, Kibana, Suricata, and Zeek.
sysmon-config - Advanced Sysmon ATT&CK configuration focusing on Detecting the Most Techniques per Data source in MITRE ATT&CK, Provide Visibility into Forensic Artifact Events for UEBA, Detect Exploitation events with wide CVE Coverage, and Risk Scoring of CVE, UEBA, Forensic, and MITRE ATT&CK Events.
reversinglabs-siem-rules - A collection of various SIEM rules relating to malware family groups.
awesome-lists - Security lists for SOC detections
Purpleteam - Purpleteam scripts simulation & Detection - trigger events for SOC detections
MurMurHash - This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.