FirmGuardian / backdoors-and-breaches-pcio
A port of BHIS's Backdoors & Breaches for playingcards.io
☆59Updated last year
Related projects: ⓘ
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆64Updated 4 years ago
- Open-Source PowerShell module to allow online play of Backdoors & Breaches card game devised by Black Hills Information Security☆55Updated 3 years ago
- The PoLRBear Project☆35Updated 3 years ago
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆36Updated 2 years ago
- ☆73Updated last year
- Conference presentations☆45Updated 10 months ago
- ☆83Updated 2 years ago
- ☆40Updated last year
- ☆41Updated 3 years ago
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆24Updated 4 months ago
- ☆40Updated 3 months ago
- Web application to create indexes for GIAC certification examinations.☆132Updated last year
- Repository for SPEED SIEM Use Case Framework☆52Updated 4 years ago
- ☆76Updated 5 years ago
- Collection of walkthroughs on various threat hunting techniques☆73Updated 4 years ago
- Cybersecurity Incident Response Plan☆86Updated 3 years ago
- Microsoft Threat Protection Advance Hunting Cheat Sheet☆76Updated 4 years ago
- BulkStrike enables the usage of CrowdStrike Real Time Response (RTR) to bulk execute commands on multiple machines.☆41Updated last year
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆122Updated last year
- DDTTX Tabletop Trainings☆28Updated 2 years ago
- ☆50Updated last year
- All my slides for any talks☆23Updated 11 months ago
- Defensive Origins Training Schedule☆35Updated 9 months ago
- Powershell - web traffic whitenoise generator☆46Updated 4 years ago
- Full of public notes and Utilities☆81Updated 3 weeks ago
- ☆51Updated 3 years ago
- ☆28Updated 3 years ago
- Convert Sigma rules to LogRhythm searches☆19Updated 2 years ago
- ☆84Updated 3 months ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆93Updated 6 months ago