EVTX-to-MITRE-Attack
RedTeam-Tools
EVTX-to-MITRE-Attack | RedTeam-Tools | |
---|---|---|
2 | 2 | |
475 | 5,177 | |
- | - | |
3.7 | 5.8 | |
about 2 months ago | 9 months ago | |
Creative Commons Zero v1.0 Universal | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
EVTX-to-MITRE-Attack
-
Mapping MITRE ATT&CK with Window Event Log IDs
Direct GitHub link bc ads. Like I commented last time I saw this project, I think it's a good starting point, but an important note: These mappings are 1:1. You should not limit your correlations to 1:1, but rather one ATT&CK term to many event IDs. Each technique can often be mapped to many, many different event IDs. And analysis / alerting on these events needs to be context aware, looking at other events before and after. When we approached this problem (mapping ATT&CK to detection logic) we realized there was almost never a scenario where event IDs could map 1:1 with the ATT&CK Matrix.
Source Github Link no ads.
RedTeam-Tools
What are some alternatives?
evtx-hunter - evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.
athena-nix - Athena OS Nix configuration files focused on Cybersecurity. Learn, practice and enjoy with any hacking tool!
SIGMA-detection-rules - Set of SIGMA rules (>320) mapped to MITRE ATT&CK tactic and techniques
Active-Directory-Exploitation-Cheat-Sheet - A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
SysmonConfigPusher - Pushes Sysmon Configs
gh0stbust3rz - Build a C2 system while becoming a techie Gh0stbust3r! Learn real-world RedTeam skills and even earn a basic c2 by completing the game
EVTX-ATTACK-SAMPLES - Windows Events Attack Samples
habu - Hacking Toolkit
Nimbo-C2 - Nimbo-C2 is yet another (simple and lightweight) C2 framework
command - Help you better learn and use the command line under Linux, Docker and other applications
CEH-in-bullet-points - 💻 Certified ethical hacker summary in bullet points
A-Red-Teamer-diaries - RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.