Useful
APT & CyberCriminal Campaign Collection
Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
An informational repo about hunting for adversaries in your IT environment.
Attack and defend active directory using modern post exploitation adversary tradecraft activity
This dataset reflects incidents of crime in the City of Los Angeles dating back to 2020. This data is transcribed from original crime reports that are typed on paper and therefore there may be some…
A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.
Playbooks to utilize DomainTools data in your security orchestration system
Scripts and a (future) library to improve users' interactions with the ATT&CK content
Security-related Slide Presentation & Security Research Report(大安全各领域各公司各会议分享的PPT以及各类安全研究报告)
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
information about ransomware groups (Ransomware Analysis Notes)
[NeurIPS 2020] Code for "An Efficient Adversarial Attack for Tree Ensembles"
An open source threat modeling tool from OWASP
Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation of detective controls with the goal of proactively identifyin…
Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise
A framework for developing alerting and detection strategies for incident response.
Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack
New Framework Red Team Operations
yara detection rules for hunting with the threathunting-keywords project
Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. Official Twitter/X account @PersistSniper. Made w…
A collection of tools, scripts and personal research
OSCP 2023 Preparation Guide | Courses, Tricks, Tutorials, Exercises, Machines
evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)
Interesting APT Report Collection And Some Special IOCs
Resources, tools and utilities about Threat Intelligence
Web app that provides basic navigation and annotation of ATT&CK matrices