Resistor52 / DockerCrashCourseLinks
Docker Crash Course: How to containerize your favorite security tools
☆28Updated 2 years ago
Alternatives and similar repositories for DockerCrashCourse
Users that are interested in DockerCrashCourse are comparing it to the libraries listed below
Sorting:
- Open Threat Hunting Framework☆118Updated 2 years ago
- Tools for simulating threats☆193Updated last year
- Conference presentations☆59Updated last week
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆135Updated 2 years ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆144Updated 2 weeks ago
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆77Updated last year
- ☆42Updated last year
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆115Updated 11 months ago
- Practical Threat Detection Engineering, Published by Packt☆76Updated 2 years ago
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆119Updated 2 years ago
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆80Updated 3 years ago
- Jupyter notebooks for threat hunting☆59Updated 5 months ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆114Updated 10 months ago
- Repository resource for threat hunter☆158Updated 7 years ago
- Identify Azure blobs using a wordlist of account name and container name strings☆43Updated 6 months ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆162Updated 10 months ago
- Active Directory Purple Team Playbook☆112Updated 2 years ago
- ☆68Updated last month
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆67Updated last year
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆123Updated last year
- Repository of attack and defensive information for Business Email Compromise investigations☆261Updated 4 months ago
- Repository of public reference frameworks for the DFIR community.☆118Updated 2 years ago
- A template for writing a condensed course index leveraging LaTeX indexing☆114Updated 3 months ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆71Updated 5 years ago
- Jupyter Notebooks for the Blue Team☆146Updated 5 months ago
- Resources To Learn And Understand SIGMA Rules☆180Updated 2 years ago
- Creating a resource to help build and manage an Insider Threat program.☆92Updated 7 months ago
- A cybersecurity game in Azure Data Explorer☆172Updated last year
- My Jupyter Notebooks☆36Updated 6 months ago
- A repository of my own Sigma detection rules.☆161Updated last year