A repository of sysmon configuration modules
-
Updated
Aug 21, 2024 - PowerShell
A repository of sysmon configuration modules
Advanced Sysmon ATT&CK configuration focusing on Detecting the Most Techniques per Data source in MITRE ATT&CK, Provide Visibility into Forensic Artifact Events for UEBA, Detect Exploitation events with wide CVE Coverage, and Risk Scoring of CVE, UEBA, Forensic, and MITRE ATT&CK Events.
A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework
A PowerShell-based toolkit and framework consisting of a collection of techniques and tradecraft for use in red team, post-exploitation, adversary simulation, or other offensive security tasks.
Purpleteam scripts simulation & Detection - trigger events for SOC detections
PowerShell Post-exploitation agent based on Mitre Att&ck framework
STI ISE 5901 Whitepaper repository
Windows network host hunting at scale!
Presentations
Small and highly portable detection tests based on MITRE's ATT&CK.
GitHub Action for local execution of Atomic Red Team tests using Invoke-Atomic
Small and highly portable detection tests based on MITRE's ATT&CK.
A repository of sysmon configuration modules
Add a description, image, and links to the mitre-attack topic page so that developers can more easily learn about it.
To associate your repository with the mitre-attack topic, visit your repo's landing page and select "manage topics."