Cyb3rWard0g / presentationsLinks
Presentation Slides and Video links
☆32Updated 4 years ago
Alternatives and similar repositories for presentations
Users that are interested in presentations are comparing it to the libraries listed below
Sorting:
- A few scripts I put together for testing purposes and to automate a few capabilities while doing IR. These scripts are also part of my bl…☆55Updated 7 years ago
- Expert Investigation Guides☆51Updated 4 years ago
- automate your MISP installs☆68Updated 5 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆65Updated 8 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 5 years ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- ☆55Updated 3 years ago
- Tools for the Computer Incident Response Team☆148Updated 8 years ago
- Splunk App to assist Sysmon Threat Hunting☆38Updated 8 years ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆79Updated 3 years ago
- Slides and Other Resources from my latest Talks and Presentations☆24Updated 2 months ago
- Sysmon Splunk App☆47Updated 7 years ago
- A collection of typical false positive indicators☆55Updated 4 years ago
- ☆77Updated 6 years ago
- Primary data pipelines for intrusion detection, security analytics and threat hunting☆85Updated 3 years ago
- InvestigationPlaybookSpec☆72Updated 8 years ago
- misp-cloud - Cloud-ready images of MISP☆74Updated 3 years ago
- A MITRE Caldera plugin written in Python 3 used to convert Red Canary Atomic Red Team Tests to MITRE Caldera Stockpile YAML ability files…☆73Updated 4 years ago
- Threat Alert Logic Repository☆92Updated 6 years ago
- ☆30Updated 7 years ago
- A website and framework for testing NIDS detection☆57Updated 4 years ago
- SEC599 supporting GitHub repository☆16Updated 6 years ago
- Integrating Sysinternals Autoruns’ logs into Security Onion☆31Updated last year
- Powershell collection designed to assist in Threat Hunting Windows systems.☆28Updated 7 years ago
- Collection of walkthroughs on various threat hunting techniques☆76Updated 5 years ago
- Create a MS Word index file from PowerPoint notes and slides☆45Updated 2 months ago
- ☆50Updated 5 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Updated 6 years ago
- An ELK environment containing interesting security datasets.☆138Updated 5 years ago