Brockway / ESA-Process-Maturity
Tools to measure the maturity of Enterprise Security Architecture processes
☆13Updated 7 years ago
Alternatives and similar repositories for ESA-Process-Maturity:
Users that are interested in ESA-Process-Maturity are comparing it to the libraries listed below
- Incident Response Playbooks☆14Updated 5 years ago
- Expert Investigation Guides☆51Updated 3 years ago
- ☆54Updated 3 years ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆38Updated 2 years ago
- Slides and Other Resources from my latest Talks and Presentations☆24Updated 4 years ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆52Updated 2 years ago
- ☆44Updated 3 months ago
- Tool used to perform threat intelligence against packet data☆35Updated last week
- Create a MS Word index file from PowerPoint notes and slides☆42Updated 4 years ago
- Sharing Threat Hunting runbooks☆24Updated 5 years ago
- Intrusion Detection Honeypots Book Code☆24Updated 4 years ago
- ☆17Updated 3 years ago
- The project was moved here https://github.com/atomic-threat-coverage/atomic-threat-coverage☆24Updated 5 years ago
- incident response scripts☆19Updated 5 years ago
- Defensive Origins Training Schedule☆37Updated last year
- ☆33Updated 6 years ago
- A Splunk app with saved reports derived from Sigma rules☆73Updated 6 years ago
- Secure and log *available* activities in your Microsoft Office 365 environment☆37Updated 6 years ago
- Jupyter notebooks☆22Updated 4 years ago
- Presentation Slides and Video links☆31Updated 3 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 3 years ago
- Splunk app for Threat hunting☆15Updated 6 years ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆67Updated 4 years ago
- A flexible, easy to use, automation framework allowing users to integrate their capabilities and devices to cut through the repetitive, t…☆12Updated 2 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆25Updated last year
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- ☆52Updated 6 years ago
- ☆29Updated 6 years ago
- SIEM Detection Use Case Library mapped to MITRE ATT&CK tactics and techniques☆12Updated 6 years ago
- ☆17Updated 2 years ago