NC3-LU / Fit4CybersecurityLinks
A self-assessment tool by @NC3-LU to help business owners implement a better cybersecurity strategy.
☆23Updated last month
Alternatives and similar repositories for Fit4Cybersecurity
Users that are interested in Fit4Cybersecurity are comparing it to the libraries listed below
Sorting:
- A generic security incident response playbook investigating and responding to potential compromises of Okta's internal systems, in the co…☆19Updated 3 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- Sharing Threat Hunting runbooks☆26Updated 5 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆15Updated 3 years ago
- Collection of videos of Raids on Cybercriminals☆19Updated 3 months ago
- Open-source Fabric templates for cybersecurity and compliance☆20Updated 5 months ago
- Use SQL to instantly query file, domain, URL and IP scanning results from VirusTotal.☆23Updated 2 weeks ago
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆11Updated last week
- Hashes of infamous malware☆26Updated last year
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated 2 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- Workflows for Shuffle☆23Updated 2 years ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆23Updated 4 months ago
- A few quick recipes for those that do not have much time during the day☆22Updated 7 months ago
- Virtual Security Operations Center☆51Updated last year
- Incident Response Report Using GitHub-Sphinx☆20Updated 5 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 3 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 5 years ago
- Virus Total Free - IOC parser and report generator☆23Updated 2 years ago
- Penguin OS Forensic (or Flight) Recorder☆40Updated 6 months ago
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated 2 weeks ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- ☆19Updated 3 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆34Updated 2 months ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆44Updated last year
- ☆16Updated 4 months ago
- ☆41Updated 4 months ago
- Helpful tools for interacting with a GoPhish phishing instance☆48Updated last week
- Incident Response Plan for all major incidents including cheatsheets for both linux and windows☆14Updated 5 years ago