LucasFaudman / sans-index-generatorLinks
Generate Indexes from SANS PDFs
☆16Updated last year
Alternatives and similar repositories for sans-index-generator
Users that are interested in sans-index-generator are comparing it to the libraries listed below
Sorting:
- ☆45Updated 2 years ago
- Tools for simulating threats☆188Updated last year
- A list of Splunk queries that I've collected and used over time.☆85Updated 4 years ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆70Updated 5 years ago
- This repository is a comprehensive collection of resources, documentation, apps, and add-ons related to Splunk, a powerful data analytics…☆23Updated this week
- Tools to automatically create a SANS index based off the course pdf files.☆103Updated 4 years ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆115Updated 9 months ago
- SPL cheatsheet for Splunk.☆24Updated 2 years ago
- Indexes for SANS Courses and GIAC Certifications☆253Updated last year
- DDTTX Tabletop Trainings☆28Updated 3 years ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆144Updated 2 weeks ago
- This repository contains Splunk queries to hunt some anomalies☆43Updated 2 years ago
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆78Updated 3 years ago
- Practical Threat Detection Engineering, Published by Packt☆75Updated 2 years ago
- Repository of SentinelOne Deep Visibility queries.☆128Updated 4 years ago
- ☆62Updated 2 years ago
- A collection of Splunk's Search Processing Language (SPL) for Threat Hunting with CrowdStrike Falcon☆207Updated 5 years ago
- Creating a resource to help build and manage an Insider Threat program.☆70Updated 5 months ago
- MISP to Sentinel integration☆68Updated last month
- ☆26Updated 3 years ago
- A port of BHIS's Backdoors & Breaches for playingcards.io☆63Updated 2 years ago
- Run Velociraptor on Security Onion☆38Updated 2 years ago
- Jupyter notebooks for threat hunting☆57Updated 3 months ago
- ☆74Updated last year
- Real-time Response scripts and schema☆115Updated last year
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Updated 3 years ago
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs☆55Updated last year
- ☆33Updated 2 years ago
- Conference presentations☆47Updated last year
- ☆41Updated last year