Mrskos-SMP / prozessbeschreibungen
Kostenlose Prozessbeschreibungen
☆11Updated 6 months ago
Alternatives and similar repositories for prozessbeschreibungen:
Users that are interested in prozessbeschreibungen are comparing it to the libraries listed below
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆137Updated 2 weeks ago
- 34 Policy Templates☆85Updated 7 months ago
- ☆116Updated last year
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆47Updated last week
- A runbook for handling security incidents in cooperation with 0xsyr0☆51Updated 2 years ago
- Some of the tools we use during vCISO engagements☆15Updated 2 years ago
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆75Updated 8 months ago
- MONARC - Method for an Optimised aNAlysis of Risks by @NC3-LU☆102Updated last week
- ☆74Updated 2 years ago
- MISP Playbooks☆182Updated last week
- A tool that allows you to document and assess any security automation in your SOC☆45Updated 3 months ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆52Updated 3 months ago
- Guide journalisation Microsoft☆59Updated 6 months ago
- Microsoft Threat Protection Advance Hunting Cheat Sheet☆79Updated 4 years ago
- Protect your data in minutes !☆116Updated 2 months ago
- LotL RMM☆117Updated last week
- Azure function to insert MISP data in to Azure Sentinel☆31Updated 2 years ago
- Data visualization for blue teams☆124Updated 2 years ago
- ☆73Updated 3 weeks ago
- ☆95Updated 2 weeks ago
- Outil de récupération automatique des données AZure / Automated tool for dumping Azure configuration data☆17Updated this week
- An open-source self-hosted purple team management web application.☆250Updated last week
- Cybersecurity Incident Response Plan☆88Updated 4 years ago
- Robo-Red-Team: Training platform for blue team cybersecurity professionals☆50Updated 3 years ago
- Repository resource for threat hunter☆158Updated 6 years ago
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆181Updated 7 months ago
- ☆65Updated last year
- Conference presentations☆47Updated last year
- VirtualGHOST Detection Tool☆89Updated 8 months ago
- Backdoors & Breaches: Campaigns. These are short guides to help Incident Captains by giving them game ideas based on actual breaches.☆34Updated last year