atc-react
A knowledge base of actionable Incident Response techniques (by atc-project)
threathunting
A Splunk app mapped to MITRE ATT&CK to guide your threat hunts (by olafhartong)
atc-react | threathunting | |
---|---|---|
1 | 3 | |
571 | 1,102 | |
0.0% | - | |
10.0 | 1.7 | |
almost 2 years ago | 9 months ago | |
Python | Python | |
Apache License 2.0 | MIT License |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
atc-react
Posts with mentions or reviews of atc-react.
We have used some of these posts to build our list of alternatives
and similar projects.
-
Mitre deTTECT
Someone knows something similar to M.Att&ck for incident response? I found this: https://github.com/atc-project/atc-react looks good but seems pretty dead, :?
threathunting
Posts with mentions or reviews of threathunting.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-05-14.
-
Breaking down MITRE ATT&CK for ICS techniques into MON Requirements?
Olaf has a Splunk module for 'threat hunting' that's mapped to the Enterprise Mitre framework, might be a good example for some components - https://github.com/olafhartong/ThreatHunting - Note: If you just blindly install it... It's pretty rough on the search head...
-
How to extract hash value from hashes field from sysmon log.
Well i'm working with this ThreatHunting app (https://github.com/olafhartong/ThreatHunting) basicly we utilize Mitre Attack framework to create sysmon rule in order to detect malwares and attacks on your computer. I'm trying to create a custom script scan the process hashes to check weather it is a threat or not cause
-
How to extract
ThreatHunting app: https://github.com/olafhartong/threathunting/
What are some alternatives?
When comparing atc-react and threathunting you can also consider the following projects:
ThePhish - ThePhish: an automated phishing email analysis tool
Incident-Playbook - GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]
sysmon-modular - A repository of sysmon configuration modules
TheHive4py - Python API Client for TheHive
splunk-connect-for-syslog - Splunk Connect for Syslog
TheHiveDocs - Documentation of TheHive
threathunting-spl - Splunk code (SPL) for serious threat hunters and detection engineers.