EventList
Hunting query generator
An automation tool that integrates Microsoft Security Baselines and MITRE ATT&CK to generate hunting queries for security operation centers.
EventList
370 stars
33 watching
40 forks
Language: PowerShell
last commit: almost 4 years ago Related projects:
Repository | Description | Stars |
---|---|---|
| Provides KQL queries for hunting and detection in security logs | 1,292 |
| Automates scanning of publicly hosted pasted data against Yara rules to identify potential security or research threats. | 1,069 |
| A web-based Yara query accelerator for malware analysis and digital forensics | 417 |
| A collection of tools and resources for threat hunters to identify and respond to cyber threats. | 861 |
| A language and runtime framework for building reusable, composable threat hunting workflows using Python. | 302 |
| Helps Threat Intelligence researchers hunt for new malware by efficiently scanning large collections of files with Yara rules | 698 |
| A collection of resources and tools for detecting and preventing malicious activity on Windows systems. | 162 |
| A tool to analyze Windows event logs for signs of APT attacks and malware activity. | 1,265 |
| A Powershell Threat Hunting Module designed to scan and survey remote endpoints for indicators of compromise or comprehensive system information. | 280 |
| An aggregator tool for querying multiple services to gather threat intelligence data. | 870 |
| A collection of threat intelligence resources and tools for analyzing APT malware | 257 |
| Tools and rules for detecting malicious domain calls in endpoint malware | 570 |
| Generates Yara signatures for identifying malware code similarities | 158 |
| Provides Splunk queries to detect vulnerability exploitation attempts and subsequent compromise, including threat hunting for MITRE ATT&CK TTPs | 58 |
| A Splunk application designed to guide threat hunts by mapping investigations to the MITRE ATT&CK framework | 1,141 |