Mrskos-SMP / prozessbeschreibungen
Kostenlose Prozessbeschreibungen
☆12Updated 9 months ago
Alternatives and similar repositories for prozessbeschreibungen:
Users that are interested in prozessbeschreibungen are comparing it to the libraries listed below
- 34 Policy Templates☆86Updated 10 months ago
- Open-Source PowerShell module to allow online play of Backdoors & Breaches card game devised by Black Hills Information Security☆56Updated 4 years ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆114Updated last year
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆77Updated 11 months ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆114Updated 6 months ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆153Updated 5 months ago
- Backdoors & Breaches: Campaigns. These are short guides to help Incident Captains by giving them game ideas based on actual breaches.☆34Updated last year
- Cybersecurity Incident Response Plan☆90Updated 4 years ago
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 5 months ago
- Repository of public reference frameworks for the DFIR community.☆116Updated last year
- Forensic Artifact Collection Tool Matrix☆83Updated 5 months ago
- A PowerShell incident response script for quick triage☆80Updated 2 years ago
- Outlook add-in companion to report suspicious mail easily☆130Updated 2 years ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆133Updated 2 years ago
- ☆118Updated last year
- ☆83Updated last month
- A list of my personal projects☆176Updated 2 years ago
- Web application to create indexes for GIAC certification examinations.☆138Updated 2 years ago
- Some of the tools we use during vCISO engagements☆15Updated 3 years ago
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆37Updated 3 years ago
- The PoLRBear Project☆35Updated 4 years ago
- Detection Ideas & Rules repository.☆179Updated 3 years ago
- A collection of Powershell scripts that will help automate the build process for a Marvel domain.☆145Updated last year
- Repository of attack and defensive information for Business Email Compromise investigations☆250Updated 2 months ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆23Updated 3 years ago
- A list of RMMs designed to be used in automation to build alerts☆110Updated 2 weeks ago
- Resources for SANS CTI Summit 2021 presentation☆102Updated last year
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆118Updated last year
- A Central Location For Everything You Need To Start Your Own Security Program In Your Organisation.☆24Updated 5 years ago