mirror of
https://github.com/0x4D31/awesome-threat-detection.git
synced 2025-01-27 23:07:03 -05:00
Merge pull request #29 from jamesspi/omm-resource
Add Oh My Malware as a Resource
This commit is contained in:
commit
6c826d3647
@ -162,7 +162,6 @@
|
||||
<li><a href="https://github.com/sbousseaden/EVTX-ATTACK-SAMPLES">EVTX-ATTACK-SAMPLES</a> - A repo of Windows event samples (EVTX) associated with ATT&CK techniques (<a href="https://docs.google.com/spreadsheets/d/12V5T9j6Fi3JSmMpAsMwovnWqRFKzzI9l2iXS5dEsnrs/edit#gid=164587082">EVTX-ATT&CK Sheet</a>).</li>
|
||||
<li><a href="http://log-sharing.dreamhosters.com">Public Security Log Sharing Site</a></li>
|
||||
<li><a href="https://github.com/splunk/attack_data">attack_data</a> - A repository of curated datasets from various attacks.</li>
|
||||
<li><a href="https://github.com/jamesspi/ohmymalware/tree/main/Event%20Data">Oh My Malware - Event Data</a> - A repository of malware datasets and alerts generated and used during episodes published on <a href="ohmymalware.com">ohmymalware.com</a>.</li>
|
||||
</ul>
|
||||
<h2 id="resources">Resources</h2>
|
||||
<ul>
|
||||
|
@ -157,7 +157,6 @@
|
||||
- [EVTX-ATTACK-SAMPLES](https://github.com/sbousseaden/EVTX-ATTACK-SAMPLES) - A repo of Windows event samples (EVTX) associated with ATT&CK techniques ([EVTX-ATT&CK Sheet](https://docs.google.com/spreadsheets/d/12V5T9j6Fi3JSmMpAsMwovnWqRFKzzI9l2iXS5dEsnrs/edit#gid=164587082)).
|
||||
- [Public Security Log Sharing Site](http://log-sharing.dreamhosters.com)
|
||||
- [attack_data](https://github.com/splunk/attack_data) - A repository of curated datasets from various attacks.
|
||||
- [Oh My Malware - Event Data](https://github.com/jamesspi/ohmymalware/tree/main/Event%20Data) - A repository of malware datasets and alerts generated and used during episodes published on ohmymalware.com.
|
||||
|
||||
|
||||
|
||||
@ -204,7 +203,7 @@
|
||||
- [Lessons Learned in Detection Engineering](https://medium.com/starting-up-security/lessons-learned-in-detection-engineering-304aec709856) - A well experienced detection engineer describes in detail his observations, challenges, and recommendations for building an effective threat detection program.
|
||||
- [A Research-Driven process applied to Threat Detection Engineering Inputs](https://ateixei.medium.com/a-research-driven-process-applied-to-threat-detection-engineering-inputs-1b7e6fe0412b).
|
||||
- [Investigation Scenario](https://twitter.com/search?q=%23InvestigationPath%20from%3Achrissanders88&f=live) tweets by Chris Sanders
|
||||
- [Oh My Malware](https://ohmymalware.com)A video series focused on malware execution and investigations using Elastic Security.
|
||||
- [Oh My Malware](https://ohmymalware.com) - A video series focused on malware execution and investigations using Elastic Security.
|
||||
|
||||
### Frameworks
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user