Mrskos-SMP / prozessbeschreibungenLinks
Kostenlose Prozessbeschreibungen
☆12Updated last year
Alternatives and similar repositories for prozessbeschreibungen
Users that are interested in prozessbeschreibungen are comparing it to the libraries listed below
Sorting:
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆119Updated last year
- Open-Source PowerShell module to allow online play of Backdoors & Breaches card game devised by Black Hills Information Security☆56Updated 4 years ago
- 34 Policy Templates☆88Updated last year
- Creating a hardened "Blue Forest" with Server 2016/2019 Domain Controllers☆266Updated last year
- A Windows event logging and collection baseline focused on finding balance between forensic value and optimising retention.☆290Updated 4 years ago
- ☆120Updated last month
- Creating a resource to help build and manage an Insider Threat program.☆101Updated 11 months ago
- Cybersecurity Incident Response Plan☆109Updated 5 years ago
- ☆43Updated 3 years ago
- Configuration Hardening Assessment PowerShell Script (CHAPS)☆187Updated 4 months ago
- MONARC - Method for an Optimised aNAlysis of Risks by @NC3-LU☆115Updated last week
- A list of my personal projects☆177Updated 3 years ago
- Atomic Purple Team Framework and Lifecycle☆299Updated 4 years ago
- Conference presentations☆60Updated 2 months ago
- Collection of useful Canary tools☆91Updated last month
- A curated list of Awesome Threat Intelligence resources☆50Updated 7 years ago
- PowerShell module for Office 365 and Azure log collection☆278Updated 3 months ago
- The PoLRBear Project☆35Updated 4 years ago
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆77Updated last year
- Applied Purple Teaming - (ITOCI4hr) - Infrastructure, Threat Optics, and Continuous Improvement - June 6, 2020☆322Updated 4 years ago
- Repository of attack and defensive information for Business Email Compromise investigations☆271Updated 7 months ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆146Updated 3 weeks ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆143Updated 3 years ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆116Updated 2 years ago
- Open Threat Hunting Framework☆121Updated 2 years ago
- A cybersecurity game in Azure Data Explorer☆174Updated last year
- Cyber Incident Response Team Playbook Battle Cards☆425Updated last year
- Outlook add-in companion to report suspicious mail easily☆133Updated 3 years ago
- ☆33Updated 2 years ago
- The Office 365 Extractor is a tool that allows for complete and reliable extraction of the Unified Audit Log (UAL)☆264Updated 3 years ago