Mrskos-SMP / prozessbeschreibungenLinks
Kostenlose Prozessbeschreibungen
☆12Updated last year
Alternatives and similar repositories for prozessbeschreibungen
Users that are interested in prozessbeschreibungen are comparing it to the libraries listed below
Sorting:
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆115Updated 11 months ago
- MONARC - Method for an Optimised aNAlysis of Risks by @NC3-LU☆108Updated last month
- Cybersecurity Incident Response Plan☆106Updated 5 years ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆149Updated 3 years ago
- ☆119Updated 2 years ago
- Fast IOC and YARA Scanner☆83Updated 5 years ago
- A list of my personal projects☆177Updated 3 years ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆144Updated last week
- Web application to create indexes for GIAC certification examinations.☆146Updated 2 years ago
- 34 Policy Templates☆87Updated last year
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆90Updated last week
- Outlook add-in companion to report suspicious mail easily☆132Updated 3 years ago
- Open-Source PowerShell module to allow online play of Backdoors & Breaches card game devised by Black Hills Information Security☆56Updated 4 years ago
- ☆45Updated 2 years ago
- A cybersecurity game in Azure Data Explorer☆173Updated last year
- Creating a resource to help build and manage an Insider Threat program.☆98Updated 8 months ago
- Run Velociraptor on Security Onion☆40Updated 3 years ago
- Repository of public reference frameworks for the DFIR community.☆119Updated 2 years ago
- A Windows event logging and collection baseline focused on finding balance between forensic value and optimising retention.☆287Updated 4 years ago
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆40Updated 4 years ago
- Backdoors & Breaches: Campaigns. These are short guides to help Incident Captains by giving them game ideas based on actual breaches.☆39Updated last year
- ☆87Updated 7 months ago
- Repository of attack and defensive information for Business Email Compromise investigations☆262Updated 5 months ago
- A tool designed to hunt for Phishing Kit source code☆224Updated 2 years ago
- Open Threat Hunting Framework☆120Updated 2 years ago
- ☆33Updated last year
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆234Updated 6 months ago
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆37Updated 3 years ago
- Detection Ideas & Rules repository.☆179Updated 4 years ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆137Updated 2 years ago