Karneades / Defensomania
Defensomania is a security monitoring and incident response card game.
☆61Updated last year
Alternatives and similar repositories for Defensomania:
Users that are interested in Defensomania are comparing it to the libraries listed below
- Recon Hunt Queries☆76Updated 3 years ago
- CSIRT Jump Bag☆27Updated 8 months ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 5 years ago
- For storing of the volumes☆4Updated 4 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆53Updated 4 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆44Updated 3 years ago
- Slides and Other Resources from my latest Talks and Presentations☆24Updated 4 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆56Updated this week
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆19Updated 2 years ago
- A collection of typical false positive indicators☆55Updated 4 years ago
- Expert Investigation Guides☆51Updated 3 years ago
- ☆14Updated 6 years ago
- Site for IWS book content☆18Updated 6 years ago
- Open-source Fabric templates for cybersecurity and compliance☆15Updated this week
- Repository for SPEED SIEM Use Case Framework☆52Updated 4 years ago
- Elasticsearch/Kibana environment and log data for Sigma workshop☆26Updated 5 years ago
- SightingDB is a database for Sightings☆22Updated last year
- ☆32Updated 2 months ago
- pocket guide for core threat hunting concepts☆23Updated 4 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Updated 5 years ago
- incident response scripts☆19Updated 5 years ago
- Dashboards for conducting forensic investigation using windows events in Kibana☆17Updated 5 years ago
- PowerSponse is a PowerShell module focused on targeted containment and remediation during incident response.☆38Updated 2 years ago
- A completely unsupported set of scripts used in SANS FOR572, Advanced Network Forensics and Analysis☆25Updated last month
- The Intelligent Process Lifecycle of Active Cyber Defenders☆31Updated 2 years ago
- A script to create and assign SOP tasks into the cases☆18Updated 4 years ago
- CyCAT.org API back-end server including crawlers☆30Updated last year
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆93Updated 2 years ago
- Integrating Sysinternals Autoruns’ logs into Security Onion☆31Updated 10 months ago