Sentinel ATT&CK Logo

Sentinel ATT&CK

0
Free
Visit Website

Sentinel ATT&CK aims to simplify the rapid deployment of a threat hunting capability that leverages Sysmon and MITRE ATT&CK on Azure Sentinel. Overview Sentinel ATT&CK provides the following tools: * An ARM template to automatically deploy Sentinel ATT&CK to your Azure environment * A Sysmon configuration file compatible with Azure Sentinel and mapped to specific ATT&CK techniques * A Sysmon log parser mapped against the OSSEM data model * 117 ready-to-use Kusto detection rules covering 156 ATT&CK techniques * A Sysmon threat hunting workbook inspired by the Threat Hunting App for Splunk to help simplify threat hunts * A Terraform script to provision a lab to test Sentinel ATT&CK Comprehensive guidance to help you use the materials in this repository Usage Head over to the WIKI to learn how to deploy and run Sentinel ATT&CK. A copy of the DEF CON 27 cloud village presentation introducing Sentinel ATT&CK can be found here and here. Contributing As this repository is constantly being updated and worked on, if you spot any problems we warmly welcome pull requests or submissions on

FEATURES

ALTERNATIVES

CRITs is an open source malware and threat repository for collaborative threat defense and analysis.

A threat intelligence and vulnerability monitoring platform that aggregates security alerts from trusted sources and provides customizable monitoring and notification capabilities.

A free and open-source OSINT framework for gathering and analyzing data from various sources

Facilitating exchange of information and knowledge to collectively protect against cyberattacks.

TIH is an intelligence tool that helps you search for IOCs across multiple security feeds and APIs.

Stay informed with Rapid7's cybersecurity blog and vulnerability news updates.

A project that detects malicious SSL connections by identifying and blacklisting SSL certificates used by botnet C&C servers and identifying JA3 fingerprints to detect and block malware botnet C&C communication.

The FASTEST Way to Consume Threat Intelligence and make it actionable.

PINNED