OktaSecurityLabs / CheatSheets
☆33Updated 6 years ago
Alternatives and similar repositories for CheatSheets:
Users that are interested in CheatSheets are comparing it to the libraries listed below
- ☆18Updated 3 years ago
- Recon Hunt Queries☆76Updated 3 years ago
- Powershell Scripts to work on Crowdstrike Falcon that pull back raw data relevant to forensic investigation☆22Updated 3 months ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 3 years ago
- Repository for SPEED SIEM Use Case Framework☆53Updated 4 years ago
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆37Updated 2 years ago
- Incident Response Playbooks☆14Updated 5 years ago
- Splunk TA for alert action to TheHive-project☆11Updated 4 years ago
- incident response scripts☆19Updated 6 years ago
- CSIRT Jump Bag☆26Updated 10 months ago
- A completely unsupported set of scripts used in SANS FOR572, Advanced Network Forensics and Analysis☆26Updated 3 months ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆38Updated 2 years ago
- ☆34Updated 3 years ago
- A collection of my presentations, blog posts, and other contributions to the information security community☆25Updated 5 months ago
- A community event for security researchers to share their favorite notebooks☆107Updated last year
- Powershell Functions to interact with TheHive-Project☆10Updated 5 years ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆52Updated 2 years ago
- Intrusion Detection Honeypots Book Code☆25Updated 4 years ago
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆27Updated last year
- Threat Hunter's Knowledge Base☆22Updated 3 years ago
- Workflows for Shuffle☆21Updated 2 years ago
- Community Sharing Repository for Carbon Black and Bit9 Platforms☆27Updated 2 years ago
- Compilation of resources to help with Adversary Simulation automation harness☆99Updated 4 years ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- Automated detection rule analysis utility☆29Updated 2 years ago
- ☆27Updated 2 years ago
- Jupyter notebooks☆23Updated 4 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- Convert Sigma rules to LogRhythm searches☆20Updated 3 years ago
- This repository was created to aid in the deployment/maintenance of the Sysmon service on a large number of computers.☆82Updated 2 years ago