TheIRGurus / PlaybooksLinks
Playbooks designed for IBM SOAR developed by The IR Gurus. These playbooks can be used to demonstrate how to design playbooks, perform automations, and expand your SOP library within your environment.
☆17Updated last year
Alternatives and similar repositories for Playbooks
Users that are interested in Playbooks are comparing it to the libraries listed below
Sorting:
- ☆58Updated 4 months ago
- This code snippet retrieves Azure Sentinel rules that are mapped to MITRE ATT&CK Framework and generates the related MITRE D3FEND defense…☆74Updated 4 years ago
- Tools for simulating threats☆199Updated 2 years ago
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆255Updated 10 months ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆159Updated 11 months ago
- OSSEM Detection Model☆184Updated 3 years ago
- ☆67Updated 2 years ago
- Repository of SentinelOne Deep Visibility queries.☆135Updated 4 years ago
- The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Of…☆277Updated 5 years ago
- A collection of Splunk's Search Processing Language (SPL) for Threat Hunting with CrowdStrike Falcon☆214Updated 5 years ago
- Cybersecurity Incident Response Plan☆109Updated 5 years ago
- Repository of public reference frameworks for the DFIR community.☆121Updated 2 years ago
- Source code for IBM SOAR Apps that are available on our App Exchange☆93Updated last week
- ☆28Updated 2 months ago
- List of custom developed KQL queries to help proactive security teams hunt for opportunistic and sophisticated threat activity by develop…☆26Updated 4 years ago
- Public script from SANS FOR509 Enterprise Cloud Incident Response☆218Updated 3 months ago
- Notes on responding to security breaches relating to Azure AD☆120Updated 3 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆131Updated 5 years ago
- Reflex SOAR☆12Updated 3 years ago
- Jupyter notebooks for threat hunting☆60Updated 10 months ago
- Convert Sigma rules to LogRhythm searches☆23Updated 3 years ago
- PowerShell module for Office 365 and Azure log collection☆280Updated 4 months ago
- Repository for SPEED SIEM Use Case Framework☆59Updated 5 years ago
- SentinelOne STAR Rules☆71Updated last year
- ☆14Updated last year
- Dettectinator - The Python library to your DeTT&CT YAML files.☆119Updated 3 weeks ago
- Unofficial third-party scripts, playbooks, and content for IBM QRadar & QRadar Community Edition.☆87Updated 9 months ago
- Repository of attack and defensive information for Business Email Compromise investigations☆275Updated 9 months ago
- ☆99Updated 3 years ago
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆142Updated last year