Sentinel ATT&CK aims to simplify the rapid deployment of a threat hunting capability that leverages Sysmon and MITRE ATT&CK on Azure Sentinel. Overview Sentinel ATT&CK provides the following tools: * An ARM template to automatically deploy Sentinel ATT&CK to your Azure environment * A Sysmon configuration file compatible with Azure Sentinel and mapped to specific ATT&CK techniques * A Sysmon log parser mapped against the OSSEM data model * 117 ready-to-use Kusto detection rules covering 156 ATT&CK techniques * A Sysmon threat hunting workbook inspired by the Threat Hunting App for Splunk to help simplify threat hunts * A Terraform script to provision a lab to test Sentinel ATT&CK Comprehensive guidance to help you use the materials in this repository Usage Head over to the WIKI to learn how to deploy and run Sentinel ATT&CK. A copy of the DEF CON 27 cloud village presentation introducing Sentinel ATT&CK can be found here and here. Contributing As this repository is constantly being updated and worked on, if you spot any problems we warmly welcome pull requests or submissions on
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A tool for extracting IOCs from various input sources and converting them into JSON format.
Scan files or process memory for Cobalt Strike beacons and parse their configuration.
Open Source Intelligence solution for threat intelligence data enrichment and quick analysis of suspicious files or malware.
A community-driven list of sample security analytics for auditing cloud usage and detecting threats in Google Cloud.
A project sharing malicious URLs used for malware distribution to help protect networks.
OpenPhish provides real-time phishing trends, detecting new phishing URLs and targeting various brands.
Repository containing IoCs related to Volexity's threat intelligence blog posts and tools.
Malware Patrol offers a range of threat intelligence solutions, including enterprise data feeds, DNS firewall, phishing threat intelligence, and small business protection.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.