CISecurity / CCPA-Docs
☆10Updated 11 months ago
Related projects ⓘ
Alternatives and complementary repositories for CCPA-Docs
- Sharing Threat Hunting runbooks☆24Updated 5 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆25Updated 10 months ago
- A few quick recipes for those that do not have much time during the day☆21Updated 3 weeks ago
- Incident Response Playbooks☆14Updated 5 years ago
- ☆11Updated 3 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Updated 3 years ago
- eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise…☆35Updated last month
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆31Updated last year
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- FIles and guides related to using Elasticstack as a SIEM☆12Updated 4 years ago
- DNS Dashboard for hunting and identifying beaconing☆14Updated 4 years ago
- Incident Response Plan for all major incidents including cheatsheets for both linux and windows☆13Updated 4 years ago
- ☆21Updated last year
- ☆17Updated 2 years ago
- OWASP Foundation Web Respository☆27Updated last year
- Incident Response Report Using GitHub-Sphinx☆19Updated 5 years ago
- MITRE ATT&CK Based App in Power BI☆12Updated 9 months ago
- ☆14Updated 3 years ago
- Actionable data for Security Operations☆18Updated 3 years ago
- Documentation used for Shuffle☆18Updated this week
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆13Updated 8 months ago
- Specific guidance and configuration scripts based on Microsoft-recommended security configuration baselines for Windows.☆11Updated 4 years ago
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆29Updated 3 years ago
- A collection of Sigma rules organized by MITRE ATT&CK technique☆16Updated 3 years ago
- ☆14Updated 4 years ago
- Table Top Exercise (TTX) for Computer Security Incident Response (CSIRT) teams. The templatized artifacts provided will hopefully help te…☆36Updated 4 years ago
- Send High & New Incidents to The Hive incident management Platform☆17Updated 3 years ago