LetsDefend / incident-response-playbooks
☆158Updated 8 months ago
Related projects ⓘ
Alternatives and complementary repositories for incident-response-playbooks
- CLI tools for forensic investigation of Windows artifacts☆315Updated 2 weeks ago
- Some important DFIR Resources☆82Updated last year
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆168Updated 4 months ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆246Updated last month
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆186Updated 4 months ago
- SIEM Cheat Sheet☆72Updated last year
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆158Updated last week
- Windows Malware Investigation Scripts & Docs☆75Updated last week
- ☆42Updated last year
- Advanced Bash script designed for conducting digital forensics on Linux systems☆130Updated 7 months ago
- A collection of companies that disclose adversary TTPs after they have been breached☆241Updated 6 months ago
- Completely Risky Active-Directory Simulation Hub☆99Updated last year
- MISP Playbooks☆174Updated last month
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆97Updated 3 months ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆203Updated last year
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆148Updated 6 months ago
- Hands-on cybersecurity projects to enhance skills in phishing investigation, malware analysis, network intrusion detection, and DDoS atta…☆87Updated 5 months ago
- Playbooks for SOC Analysts☆144Updated last year
- ☆35Updated last year
- A collection of CVEs weaponized by ransomware operators☆74Updated this week
- ThreatSeeker: Threat Hunting via Windows Event Logs☆114Updated last year
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆110Updated 7 months ago
- Some Threat Hunting queries useful for blue teamers☆123Updated 2 years ago
- A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as …☆356Updated 2 months ago
- ☆48Updated last year
- Harness the power of Splunk for your investigations☆77Updated this week
- ☆148Updated last year
- Repository resource for threat hunter☆158Updated 6 years ago
- CarbonBlack EDR detection rules and response actions☆71Updated 2 months ago
- A curated list of tools for incident response. With repository stars⭐ and forks🍴☆195Updated this week