All Projects → christophetd → Hunting Mindmaps

christophetd / Hunting Mindmaps

🔍 Mindmaps for threat hunting - work in progress.

Projects that are alternatives of or similar to Hunting Mindmaps

Threatingestor
Extract and aggregate threat intelligence.
Stars: ✭ 439 (+410.47%)
Mutual labels:  threat-hunting
Apullo
A scanner for taking basic fingerprints
Stars: ✭ 22 (-74.42%)
Mutual labels:  threat-hunting
Ioc Explorer
Explore Indicators of Compromise Automatically
Stars: ✭ 73 (-15.12%)
Mutual labels:  threat-hunting
Klara
Kaspersky's GReAT KLara
Stars: ✭ 565 (+556.98%)
Mutual labels:  threat-hunting
Threathunting
A Splunk app mapped to MITRE ATT&CK to guide your threat hunts
Stars: ✭ 738 (+758.14%)
Mutual labels:  threat-hunting
Beagle
Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.
Stars: ✭ 976 (+1034.88%)
Mutual labels:  threat-hunting
Patrowlmanager
PatrOwl - Open Source, Smart and Scalable Security Operations Orchestration Platform
Stars: ✭ 363 (+322.09%)
Mutual labels:  threat-hunting
Evtx Attack Samples
Windows Events Attack Samples
Stars: ✭ 1,243 (+1345.35%)
Mutual labels:  threat-hunting
Sysmontools
Utilities for Sysmon
Stars: ✭ 903 (+950%)
Mutual labels:  threat-hunting
Malware Feed
Bringing you the best of the worst files on the Internet.
Stars: ✭ 69 (-19.77%)
Mutual labels:  threat-hunting
Auditd Attack
A Linux Auditd rule set mapped to MITRE's Attack Framework
Stars: ✭ 642 (+646.51%)
Mutual labels:  threat-hunting
Bluespawn
An Active Defense and EDR software to empower Blue Teams
Stars: ✭ 737 (+756.98%)
Mutual labels:  threat-hunting
Rpot
Real-time Packet Observation Tool
Stars: ✭ 38 (-55.81%)
Mutual labels:  threat-hunting
Fatt
FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network traffic
Stars: ✭ 490 (+469.77%)
Mutual labels:  threat-hunting
Signature Base
Signature base for my scanner tools
Stars: ✭ 1,212 (+1309.3%)
Mutual labels:  threat-hunting
Fcl
FCL (Fileless Command Lines) - Known command lines of fileless malicious executions
Stars: ✭ 409 (+375.58%)
Mutual labels:  threat-hunting
Besafe
BeSafe is robust threat analyzer which help to protect your desktop environment and know what's happening around you
Stars: ✭ 21 (-75.58%)
Mutual labels:  threat-hunting
Teler
Real-time HTTP Intrusion Detection
Stars: ✭ 1,248 (+1351.16%)
Mutual labels:  threat-hunting
Sysmon Modular
A repository of sysmon configuration modules
Stars: ✭ 1,229 (+1329.07%)
Mutual labels:  threat-hunting
Yeti
Your Everyday Threat Intelligence
Stars: ✭ 1,037 (+1105.81%)
Mutual labels:  threat-hunting

Threat hunting mindmaps

This repository contains a few personal mindmaps I use as a reference for threat hunting and incident response. It is currently highly WIP.

Work in progress

  • Hunting for common lateral movement mechanisms
  • Evidence of execution (prefetch files, Amcache...)
  • Methods of credentials theft and associated protections

Disclaimer

These mindmaps are for my personal reference and might consequently be incomplete, intentionally or not. Feel free to open an issue for discussion though!

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].