Mrskos-SMP / prozessbeschreibungen
Kostenlose Prozessbeschreibungen
☆11Updated 2 months ago
Related projects: ⓘ
- ☆113Updated 11 months ago
- Forensic Artifact Collection Tool Matrix☆70Updated 2 years ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆100Updated last year
- A list of RMMs designed to be used in automation to build alerts☆103Updated last week
- A tool that allows you to document and assess any security automation in your SOC☆40Updated 4 months ago
- Collection of useful Canary tools☆67Updated last week
- MONARC - Method for an Optimised aNAlysis of Risks by @NC3-LU☆100Updated last week
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆147Updated 4 months ago
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆132Updated last week
- MISP Playbooks☆167Updated last month
- ☆79Updated last month
- HASH (HTTP Agnostic Software Honeypot)☆128Updated 4 months ago
- Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations☆73Updated last month
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆90Updated this week
- Data visualization for blue teams☆122Updated last year
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆48Updated 2 weeks ago
- ☆63Updated last month
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆108Updated 9 months ago
- The Intelligent Process Lifecycle of Active Cyber Defenders☆31Updated last year
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆36Updated 2 years ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆113Updated 9 months ago
- Convert Sigma rules to Wazuh rules☆55Updated 5 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆56Updated this week
- Home for TRANSITS materials☆15Updated last month
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆68Updated 9 months ago
- A PowerShell incident response script for quick triage☆75Updated 2 years ago
- Repository resource for threat hunter☆157Updated 6 years ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆23Updated 2 years ago
- A runbook for handling security incidents in cooperation with 0xsyr0☆50Updated last year
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆122Updated last year