|9 days ago||5 days ago|
|MIT License||MIT License|
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Is Windows Defender for Business any good?
2 projects | reddit.com/r/cybersecurity | 9 Nov 2022
Agree. Harden your endpoints (if unsure where to start consider hardening kitty, https://github.com/scipag/HardeningKitty) and harden Defender (https://0ut3r.space/2022/03/06/windows-defender/). Add Sysmon with a good config (https://github.com/olafhartong/sysmon-modular) and you've reached a good starting point.
New blue team
11 projects | reddit.com/r/blueteamsec | 16 Oct 2022
Microsoft recommend Sysmon and EDR
4 projects | reddit.com/r/blueteamsec | 13 Oct 2022
Security Cadence: Sysmon (Logging Part 2 out of ?????)
4 projects | reddit.com/r/sysadmin | 16 May 2022
Another really excellent resource (also called out by Swift) is Olaf Hartong’s Sysmon-Modular project: https://github.com/olafhartong/sysmon-modular As well as having a few full configs, Olaf’s project has modular XML configurations for each supported Sysmon Event ID. This can be incredibly helpful for fine tuning your configs.
splunk sysmon events
2 projects | reddit.com/r/Splunk | 2 Apr 2022
Yes absolutely. This is a very common workflow for both. One note is that you need to also find a sysmon config to use as well, and there's no easy way to manage either sysmon or its config through Splunk. Recommendations for a config are either SwiftOnSecurity's or Olaf's SysmonModular. They significantly overlap and work with each other on patches. SwiftOnSecurity's is a better pure drop-in, and Olaf's is better if you want to do customization.
Best monitoring software that works like event logs?
2 projects | reddit.com/r/sysadmin | 21 Feb 2022
For some of the items you mentioned having a good sysmon config would help too. https://github.com/SwiftOnSecurity/sysmon-config or https://github.com/olafhartong/sysmon-modular are good starting points
Hosts making DNS queries to malicious site. How to dig deeper and find source?
2 projects | reddit.com/r/AskNetsec | 9 Feb 2022
I'd install sysmon if it is not already present on the infected machines, with Swift's config or Olaf's config file.
This Visual Studio Code extension is for heping in the writting of Sysmon XML configuration files - now supports Sysmon for Linux schema
3 projects | reddit.com/r/blueteamsec | 17 Oct 2021
SwiftOnSecurity's config is well commented, going through it may help. There's also sysmon-modular which seems similar.
Attack simulation tool based on CVE
4 projects | reddit.com/r/redteamsec | 6 Oct 2022
A lot of tools exist for testing and it depends on what you want to test for which is the right thing. MITRE Atomic Red Team for example will test via PowerShell on a SOE, https://github.com/redcanaryco/atomic-red-team and includes payloads that it calls over the network from GitHub for example.
What cyberscurty attack tools could I demonstrate for a school project?
3 projects | reddit.com/r/sysadmin | 25 Sep 2022
Might this be interesting? https://github.com/redcanaryco/atomic-red-team
I need to get infected!!!!
5 projects | reddit.com/r/sysadmin | 9 Sep 2022
You can easily test specific malicious behaviours using Atomic Red Team: https://github.com/redcanaryco/atomic-red-team
If you could name 5 tools/software worth learning for a cybersecurity analyst to become more employable, what would they be?
5 projects | reddit.com/r/cybersecurity | 24 Jul 2022
https://github.com/redcanaryco/atomic-red-team Atomic Red Team™ is a library of tests mapped to the MITRE ATT&CK® framework. Security teams can use Atomic Red Team to quickly, portably, and reproducibly test their environments.
Evaluating Security Tools
3 projects | dev.to | 16 Jul 2022
This is just a single possible test setup that you can use for testing and evaluating a security tool or a set of security tools. It is not by any means an exhaustive test, if anything it's extremely basic. But if you try it with your security tools I bet you'll be amazed at what is and isn't caught and you'll learn something valuable. There are some great resources out there for finding different methods to use with different platforms and threat scenarios. One of my favorites is Atomic Red Team.
SIEM Test Cases
4 projects | reddit.com/r/cybersecurity | 19 Oct 2021
SIGMA SOCPrime Sigma Sigma Translator Elastic Rules Splunk Rules ThreatHunter Playbook iRedTeam Lolbas Atomic Red Team
Red team reports
2 projects | reddit.com/r/cyber_security | 29 Sep 2021
If you want to spend some time reading, here are 2 sites to keep you busy https://github.com/redcanaryco/atomic-red-team/tree/master/atomics
What are some alternatives?
detection-rules - Rules for Elastic Security's detection engine
BLUESPAWN - An Active Defense and EDR software to empower Blue Teams
sigma - Generic Signature Format for SIEM Systems
sysmon-config - Sysmon configuration file template with default high-quality event tracing
Incident-Playbook - GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]
DetectionLabELK - DetectionLabELK is a fork from DetectionLab with ELK stack instead of Splunk.
public-pentesting-reports - A list of public penetration test reports published by several consulting firms and academic security groups.
security_content - Splunk Security Content
Certified-Kubernetes-Security-Specialist - Curated resources help you prepare for the CNCF/Linux Foundation CKS 2021 "Kubernetes Certified Security Specialist" Certification exam. Please provide feedback or requests by raising issues, or making a pull request. All feedback for improvements are welcome. thank you.
Windows-Toolkit - PS one-liner cmdlets for Windows security
APTSimulator - A toolset to make a system look as if it was the victim of an APT attack
Power-Response - Powering Up Incident Response with Power-Response