PacktPublishing / Security-Orchestration-Automation-and-Response-for-Security-Analysts
Security Orchestration, Automation and Response for Security Analysts, published by Packt
☆17Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Security-Orchestration-Automation-and-Response-for-Security-Analysts
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 4 months ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- This Repository gives the best and possible strategies against hunting the ransomware☆24Updated 2 years ago
- Purple Team Strategies, Published by Packt☆11Updated last year
- ☆43Updated last month
- A collection of Sigma rules organized by MITRE ATT&CK technique☆16Updated 3 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 2 years ago
- Ansible playbooks for the Seclab project☆12Updated 2 years ago
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆41Updated 2 years ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆10Updated 2 years ago
- Resources for AD penetration testing and security☆30Updated 2 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆11Updated last year
- Active DIrectory Lab for Pentesting Practice☆24Updated 2 years ago
- Ransomware Simulator for testing Blue Team Detections☆35Updated 2 years ago
- A network logging tool that logs per process activities☆32Updated last year
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆25Updated 10 months ago
- Random tips and tricks RE: ransomware☆14Updated 3 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated last year
- Virus Total Free - IOC parser and report generator☆22Updated last year
- Collection of videos of Raids on Cybercriminals☆17Updated last month
- General Content☆20Updated 4 months ago
- Security Operation Center Lab☆15Updated last month
- A full analysis report detailing as much as possible of a Malware or a Threat☆24Updated 5 months ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆50Updated last year
- ☆29Updated last year
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆38Updated last year
- A curated list of awesome threat detection and hunting resources☆16Updated 6 years ago