Cyb3rWard0g / infosec-well-done
A few quick recipes for those that do not have much time during the day
☆22Updated 3 months ago
Alternatives and similar repositories for infosec-well-done:
Users that are interested in infosec-well-done are comparing it to the libraries listed below
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- ☆11Updated 4 years ago
- Sharing Threat Hunting runbooks☆24Updated 5 years ago
- A script to create and assign SOP tasks into the cases☆18Updated 4 years ago
- incident response scripts☆19Updated 5 years ago
- ☆12Updated 5 years ago
- Incident Response Report Using GitHub-Sphinx☆19Updated 5 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 3 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆16Updated 3 years ago
- Git for me to put all my forensics stuff☆21Updated last week
- ☆29Updated 6 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆28Updated 7 years ago
- PowerShell Memory Pulling script☆19Updated 9 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 5 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 3 years ago
- A simple ReST server to lookup threat actors (by name, synonym or UUID) and returning the corresponding MISP galaxy information about the…☆47Updated last year
- Indices for courses in SANS' Network Security Operations curriculum☆15Updated 8 years ago
- OSSEM Modular☆27Updated 4 years ago
- DNS Dashboard for hunting and identifying beaconing☆14Updated 4 years ago
- Best practices in threat intelligence☆46Updated 2 years ago
- ☆11Updated 3 years ago
- Python script to automatically create sigma rules from The hive observables☆23Updated 5 years ago
- PowerSponse is a PowerShell module focused on targeted containment and remediation during incident response.☆38Updated 2 years ago
- Following repository contains source codes used in my two Books.☆11Updated 9 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆24Updated 8 years ago
- Threat Mitigation Strategies☆25Updated last year
- ☆14Updated 4 years ago
- Automatic detection engineering technical state compliance☆53Updated 6 months ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 3 years ago