Incident Response with Threat Intelligence, published by Packt
☆57Apr 18, 2024Updated last year
Alternatives and similar repositories for Incident-Response-with-Threat-Intelligence
Users that are interested in Incident-Response-with-Threat-Intelligence are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Purple Team Strategies, Published by Packt☆14Mar 2, 2026Updated 3 weeks ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆14Nov 29, 2023Updated 2 years ago
- A repo to support the book☆46Jan 18, 2023Updated 3 years ago
- ☆44Jul 11, 2025Updated 8 months ago
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆72Apr 3, 2024Updated last year
- Re-play Adversarial Techniques☆57Mar 18, 2021Updated 5 years ago
- ☆28Nov 25, 2025Updated 3 months ago
- Cybersecurity Incident Response Plan☆109Oct 2, 2020Updated 5 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Feb 3, 2022Updated 4 years ago
- ☆22Jun 2, 2023Updated 2 years ago
- macos-collector - Automated Collection of macOS Forensic Artifacts for DFIR☆37Mar 16, 2026Updated last week
- Slides of my public talks☆63Feb 20, 2026Updated last month
- Incident Response Report Using GitHub-Sphinx☆20Oct 28, 2019Updated 6 years ago
- Coleccion de IRM de Societe Generale traducidos por mí al Español☆35May 12, 2017Updated 8 years ago
- A Golang implant that uses Slack as a command and control server☆47Jun 10, 2020Updated 5 years ago
- NTFS samples☆27Aug 1, 2020Updated 5 years ago
- ☆33Dec 4, 2022Updated 3 years ago
- Releases for the Zui Insiders app.☆22Feb 17, 2025Updated last year
- A full analysis report detailing as much as possible of a Malware or a Threat☆31Jan 30, 2026Updated last month
- Microsoft 365 Defender Hunting via PowerShell.☆14Feb 8, 2022Updated 4 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Mar 1, 2023Updated 3 years ago
- Issues to consider when planning a red team exercise.☆14Aug 23, 2017Updated 8 years ago
- Listen for usb devices and automatically submit all files on device to cuckoo☆13Apr 30, 2017Updated 8 years ago
- Find world writable directories that contain a .exe or .dll file☆13Aug 31, 2021Updated 4 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆14Mar 6, 2026Updated 2 weeks ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Nov 10, 2020Updated 5 years ago
- ☆15Dec 20, 2022Updated 3 years ago
- Windows Security Logging☆43Jul 17, 2022Updated 3 years ago
- Virus Total Free - IOC parser and report generator☆25Mar 19, 2023Updated 3 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆21Jul 4, 2023Updated 2 years ago
- Ekoparty's BlueSpace Keynote November 2021. Shoutout to @plugxor Muchas Gracias!!!☆13Jun 5, 2023Updated 2 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Aug 11, 2021Updated 4 years ago
- ☆33May 19, 2024Updated last year
- ☆12Dec 7, 2022Updated 3 years ago
- A collection of pen-testing/hacking scripts. Various uses.☆13Oct 24, 2020Updated 5 years ago
- This is a collection of Security Baselines that I use in my virtual lab environment.☆23Mar 11, 2020Updated 6 years ago
- Just a place to share some things I've written while participating in Hack The Box.☆18Jun 5, 2020Updated 5 years ago
- Find kernel32 base and API addresses. Simple C++ implementation☆23Apr 7, 2022Updated 3 years ago
- Cyber Incident Response Team Playbook Battle Cards☆425May 10, 2024Updated last year