Mrskos-SMP / prozessbeschreibungenLinks
Kostenlose Prozessbeschreibungen
☆12Updated last year
Alternatives and similar repositories for prozessbeschreibungen
Users that are interested in prozessbeschreibungen are comparing it to the libraries listed below
Sorting:
- 34 Policy Templates☆88Updated last year
- Outil de récupération automatique des données de l'Active Directory / Automated tool for dumping Active Directory data☆255Updated last week
- ☆119Updated last year
- A Windows event logging and collection baseline focused on finding balance between forensic value and optimising retention.☆289Updated 3 years ago
- Cybersecurity Incident Response Plan☆91Updated 4 years ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆147Updated 3 years ago
- Russia / Ukraine 2022 conflict related IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆175Updated 2 years ago
- MONARC - Method for an Optimised aNAlysis of Risks by @NC3-LU☆107Updated last week
- Tools for hunting for threats.☆593Updated 3 months ago
- Outlook add-in companion to report suspicious mail easily☆131Updated 2 years ago
- OpenVAS Reporting: Convert OpenVAS XML report files to reports☆146Updated last year
- Creating a hardened "Blue Forest" with Server 2016/2019 Domain Controllers☆264Updated 10 months ago
- Atomic Purple Team Framework and Lifecycle☆299Updated 4 years ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆115Updated 9 months ago
- A list of my personal projects☆178Updated 2 years ago
- Repository resource for threat hunter☆158Updated 6 years ago
- Configuration Hardening Assessment PowerShell Script (CHAPS)☆184Updated 3 months ago
- Open-Source PowerShell module to allow online play of Backdoors & Breaches card game devised by Black Hills Information Security☆56Updated 4 years ago
- Awesome Incident Response☆275Updated last year
- Convert Sigma rules to Wazuh rules☆67Updated last year
- ☆83Updated 3 years ago
- Swordphish Phishing Awareness Tool☆224Updated 10 months ago
- Web application to create indexes for GIAC certification examinations.☆143Updated 2 years ago
- A tool designed to hunt for Phishing Kit source code☆224Updated 2 years ago
- ☆86Updated 5 months ago
- Cyber Incident Response Team Playbook Battle Cards☆385Updated last year
- ☆45Updated 2 years ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆162Updated 8 months ago
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆240Updated last month
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆88Updated this week