Mrskos-SMP / prozessbeschreibungenLinks
Kostenlose Prozessbeschreibungen
☆12Updated last year
Alternatives and similar repositories for prozessbeschreibungen
Users that are interested in prozessbeschreibungen are comparing it to the libraries listed below
Sorting:
- 34 Policy Templates☆88Updated last year
- Cybersecurity Incident Response Plan☆91Updated 4 years ago
- MONARC - Method for an Optimised aNAlysis of Risks by @NC3-LU☆107Updated 2 weeks ago
- ☆119Updated last year
- Open Threat Hunting Framework☆117Updated 2 years ago
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 8 months ago
- ☆85Updated 4 months ago
- Repository of public reference frameworks for the DFIR community.☆116Updated 2 years ago
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆219Updated 3 months ago
- MISP Playbooks☆206Updated last month
- A list of my personal projects☆177Updated 2 years ago
- Cyber Incident Response Team Playbook Battle Cards☆382Updated last year
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆164Updated last year
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆39Updated 4 years ago
- A Windows event logging and collection baseline focused on finding balance between forensic value and optimising retention.☆288Updated 3 years ago
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆37Updated 3 years ago
- ☆77Updated 2 years ago
- Russia / Ukraine 2022 conflict related IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆175Updated 2 years ago
- ☆32Updated last year
- Repository of attack and defensive information for Business Email Compromise investigations☆257Updated 2 months ago
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆77Updated last year
- Outlook add-in companion to report suspicious mail easily☆131Updated 2 years ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆115Updated 9 months ago
- An application to analyze the EML file☆289Updated 3 months ago
- ☆45Updated 2 years ago
- Convert Sigma rules to Wazuh rules☆67Updated last year
- Docker image for Velocidex Velociraptor☆129Updated 4 months ago
- LotL RMM☆218Updated 3 weeks ago
- ☆28Updated 3 months ago
- ☆95Updated 2 years ago