Mrskos-SMP / prozessbeschreibungenLinks
Kostenlose Prozessbeschreibungen
☆12Updated last year
Alternatives and similar repositories for prozessbeschreibungen
Users that are interested in prozessbeschreibungen are comparing it to the libraries listed below
Sorting:
- 34 Policy Templates☆87Updated last year
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆116Updated last year
- MONARC - Method for an Optimised aNAlysis of Risks by @NC3-LU☆111Updated 2 weeks ago
- A Windows event logging and collection baseline focused on finding balance between forensic value and optimising retention.☆288Updated 4 years ago
- Outil de récupération automatique des données de l'Active Directory / Automated tool for dumping Active Directory data☆273Updated 3 weeks ago
- Cybersecurity Incident Response Plan☆108Updated 5 years ago
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆151Updated last week
- Awesome Incident Response☆283Updated last month
- A tool that allows you to document and assess any security automation in your SOC☆47Updated last year
- Creating a resource to help build and manage an Insider Threat program.☆99Updated 9 months ago
- Cyber Incident Response Team Playbook Battle Cards☆419Updated last year
- A list of my personal projects☆177Updated 3 years ago
- ☆119Updated 2 years ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆145Updated 3 weeks ago
- Tools for simulating threats☆193Updated 2 years ago
- Open Threat Hunting Framework☆121Updated 2 years ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆149Updated 3 years ago
- These are open source rules that can be utilized with QRadar to detect various types of threats in the environment.☆56Updated 6 years ago
- PowerShell module for Office 365 and Azure log collection☆275Updated last month
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆77Updated last year
- Russia / Ukraine 2022 conflict related IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆175Updated 2 years ago
- A cybersecurity game in Azure Data Explorer☆173Updated last year
- ☆73Updated 2 years ago
- ☆94Updated 2 months ago
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆257Updated 3 months ago
- Configuration Hardening Assessment PowerShell Script (CHAPS)☆185Updated 2 months ago
- Repository resource for threat hunter☆158Updated 7 years ago
- Creating a hardened "Blue Forest" with Server 2016/2019 Domain Controllers☆263Updated last year
- ☆45Updated 3 years ago
- ☆77Updated 3 years ago