LucasFaudman / sans-index-generatorLinks
Generate Indexes from SANS PDFs
☆16Updated last year
Alternatives and similar repositories for sans-index-generator
Users that are interested in sans-index-generator are comparing it to the libraries listed below
Sorting:
- ☆45Updated 2 years ago
- A list of Splunk queries that I've collected and used over time.☆85Updated 4 years ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆71Updated 5 years ago
- Tools for simulating threats☆191Updated last year
- This repository is a comprehensive collection of resources, documentation, apps, and add-ons related to Splunk, a powerful data analytics…☆23Updated 2 weeks ago
- ☆63Updated 2 years ago
- Real-time Response scripts and schema☆115Updated last year
- This repository contains Splunk queries to hunt some anomalies☆43Updated 3 years ago
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs☆55Updated 2 years ago
- A curated list of awesome threat detection and hunting resources☆16Updated 6 years ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Updated 3 years ago
- A dataset containing Office 365 Unified Audit Logs for security research and detection☆52Updated 3 years ago
- ☆28Updated 4 months ago
- Repository of SentinelOne Deep Visibility queries.☆129Updated 4 years ago
- ☆86Updated 5 months ago
- ☆26Updated 3 years ago
- DDTTX Tabletop Trainings☆28Updated 3 years ago
- Incident Response documents and tooling☆74Updated last year
- ☆76Updated last year
- Online resources related to SOC Analysts. Incident investigation reference material, blogs, newsletters, good reads, books, trainings, po…☆22Updated 3 weeks ago
- Advanced Threat Hunting: Ransomware Group☆28Updated 3 weeks ago
- A collection of Splunk's Search Processing Language (SPL) for Threat Hunting with CrowdStrike Falcon☆208Updated 5 years ago
- Jupyter notebooks for threat hunting☆58Updated 4 months ago
- ☆72Updated 2 years ago
- Tools to automatically create a SANS index based off the course pdf files.☆106Updated 4 years ago
- SPL cheatsheet for Splunk.☆24Updated 2 years ago
- The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Of…☆260Updated 4 years ago
- Cybersecurity Incident Response Plan☆91Updated 4 years ago
- Public script from SANS FOR509 Enterprise Cloud Incident Response☆205Updated 10 months ago
- Indexes for SANS Courses and GIAC Certifications☆254Updated last year