PacktPublishing / Security-Orchestration-Automation-and-Response-for-Security-AnalystsLinks
Security Orchestration, Automation and Response for Security Analysts, published by Packt
☆20Updated 5 months ago
Alternatives and similar repositories for Security-Orchestration-Automation-and-Response-for-Security-Analysts
Users that are interested in Security-Orchestration-Automation-and-Response-for-Security-Analysts are comparing it to the libraries listed below
Sorting:
- This Repository gives the best and possible strategies against hunting the ransomware☆26Updated 2 years ago
- ☆21Updated 2 years ago
- Purple Team Strategies, Published by Packt☆12Updated 2 years ago
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆26Updated 7 months ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- Linux Baseline and Forensic Triage Tool - BETA☆55Updated 2 years ago
- ☆47Updated 2 months ago
- Red Team Operations Framework☆18Updated 11 months ago
- ☆32Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 11 months ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆42Updated 3 years ago
- Python for Defenders Course Resources☆18Updated last year
- Repo to hold my PowerShell Scripts☆17Updated 2 years ago
- Active DIrectory Lab for Pentesting Practice☆24Updated 2 years ago
- Incident Response with Threat Intelligence, published by Packt☆52Updated last year
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆27Updated 2 years ago
- Baseline a Windows System against LOLBAS☆27Updated last year
- Cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for them☆28Updated last year
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆28Updated last year
- ☆74Updated 3 weeks ago
- ☆33Updated last year
- The ultimate repository for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆24Updated last month
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆26Updated 3 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆82Updated last year
- List of Command&Control (C2) software☆41Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆52Updated 6 months ago
- A network logging tool that logs per process activities☆32Updated 2 years ago
- Python3 script to quickly get various information from a domain controller through his LDAP service.☆11Updated 3 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Security Operation Center Lab☆19Updated 8 months ago