ThreatHunting-Keywords
Purpleteam
ThreatHunting-Keywords | Purpleteam | |
---|---|---|
1 | 1 | |
339 | 123 | |
- | - | |
9.4 | 7.8 | |
1 day ago | 16 days ago | |
HTML | PowerShell | |
MIT License | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
ThreatHunting-Keywords
-
List of offensive tools keywords for ThreatHunting
more information here: https://github.com/mthcht/ThreatHunting-Keywords
Purpleteam
What are some alternatives?
sysmon-config - Advanced Sysmon ATT&CK configuration focusing on Detecting the Most Techniques per Data source in MITRE ATT&CK, Provide Visibility into Forensic Artifact Events for UEBA, Detect Exploitation events with wide CVE Coverage, and Risk Scoring of CVE, UEBA, Forensic, and MITRE ATT&CK Events.
MAL-CL - MAL-CL (Malicious Command-Line)
reversinglabs-siem-rules - A collection of various SIEM rules relating to malware family groups.
UltimateAppLockerByPassList - The goal of this repository is to document the most common techniques to bypass AppLocker.
awesome-lists - Security lists for SOC detections
MurMurHash - This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
chainsaw - Rapidly Search and Hunt through Windows Forensic Artefacts
macOS-ATTACK-DATASET - JSON DataSet for macOS mapped to MITRE ATT&CK Tactics.
awesome-threat-detection - ✨ A curated list of awesome threat detection and hunting resources 🕵️♂️