Merge pull request #29 from jamesspi/omm-resource

Add Oh My Malware as a Resource
pull/33/head^2
Adel K 2023-07-26 22:37:39 +02:00 committed by GitHub
commit 6c826d3647
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 1 additions and 3 deletions

View File

@ -162,7 +162,6 @@
<li><a href="https://github.com/sbousseaden/EVTX-ATTACK-SAMPLES">EVTX-ATTACK-SAMPLES</a> - A repo of Windows event samples (EVTX) associated with ATT&amp;CK techniques (<a href="https://docs.google.com/spreadsheets/d/12V5T9j6Fi3JSmMpAsMwovnWqRFKzzI9l2iXS5dEsnrs/edit#gid=164587082">EVTX-ATT&CK Sheet</a>).</li>
<li><a href="http://log-sharing.dreamhosters.com">Public Security Log Sharing Site</a></li>
<li><a href="https://github.com/splunk/attack_data">attack_data</a> - A repository of curated datasets from various attacks.</li>
<li><a href="https://github.com/jamesspi/ohmymalware/tree/main/Event%20Data">Oh My Malware - Event Data</a> - A repository of malware datasets and alerts generated and used during episodes published on <a href="ohmymalware.com">ohmymalware.com</a>.</li>
</ul>
<h2 id="resources">Resources</h2>
<ul>

View File

@ -157,7 +157,6 @@
- [EVTX-ATTACK-SAMPLES](https://github.com/sbousseaden/EVTX-ATTACK-SAMPLES) - A repo of Windows event samples (EVTX) associated with ATT&CK techniques ([EVTX-ATT&CK Sheet](https://docs.google.com/spreadsheets/d/12V5T9j6Fi3JSmMpAsMwovnWqRFKzzI9l2iXS5dEsnrs/edit#gid=164587082)).
- [Public Security Log Sharing Site](http://log-sharing.dreamhosters.com)
- [attack_data](https://github.com/splunk/attack_data) - A repository of curated datasets from various attacks.
- [Oh My Malware - Event Data](https://github.com/jamesspi/ohmymalware/tree/main/Event%20Data) - A repository of malware datasets and alerts generated and used during episodes published on ohmymalware.com.
@ -204,7 +203,7 @@
- [Lessons Learned in Detection Engineering](https://medium.com/starting-up-security/lessons-learned-in-detection-engineering-304aec709856) - A well experienced detection engineer describes in detail his observations, challenges, and recommendations for building an effective threat detection program.
- [A Research-Driven process applied to Threat Detection Engineering Inputs](https://ateixei.medium.com/a-research-driven-process-applied-to-threat-detection-engineering-inputs-1b7e6fe0412b).
- [Investigation Scenario](https://twitter.com/search?q=%23InvestigationPath%20from%3Achrissanders88&f=live) tweets by Chris Sanders
- [Oh My Malware](https://ohmymalware.com)A video series focused on malware execution and investigations using Elastic Security.
- [Oh My Malware](https://ohmymalware.com) - A video series focused on malware execution and investigations using Elastic Security.
### Frameworks