austinsonger / Incident-PlaybookLinks
GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]
☆1,519Updated last year
Alternatives and similar repositories for Incident-Playbook
Users that are interested in Incident-Playbook are comparing it to the libraries listed below
Sorting:
- Incident Response Methodologies 2022☆1,082Updated 7 months ago
- Splunk Security Content☆1,522Updated this week
- Set of Mindmaps providing a detailed overview of the different #Microsoft auditing capacities for Windows, Exchange, Azure,...☆1,087Updated last week
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆1,087Updated this week
- A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data int…☆2,386Updated this week
- Collaborative Incident Response platform☆1,311Updated this week
- A concise, directive, specific, flexible, and free incident response plan template☆747Updated last year
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆951Updated 2 years ago
- Cybersecurity Evaluation Tool☆1,711Updated this week
- A knowledge base of actionable Incident Response techniques☆654Updated 3 years ago
- A repository of curated datasets from various attacks☆695Updated this week
- You didn't think I'd go and leave the blue team out, right?☆1,708Updated last month
- Detect Tactics, Techniques & Combat Threats☆2,225Updated 3 weeks ago
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,203Updated last month
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆696Updated 7 months ago
- Watcher - Open Source AI-powered Cyber Threat Intelligence & Hunting Platform. Developed with Django & React JS.☆1,057Updated last week
- SIEM Tactics, Techiques, and Procedures☆678Updated last month
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆634Updated last year
- The SOC Analysts all-in-one CLI tool to automate and speed up workflow.☆1,440Updated last year
- Digital Forensics Investigation Platform☆858Updated last year
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,291Updated 2 years ago
- Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK☆1,074Updated 11 months ago
- Hunting queries and detections☆857Updated 3 weeks ago
- Scripts and a (future) library to improve users' interactions with the ATT&CK content☆585Updated last year
- A curated Cyber "Security Orchestration, Automation and Response (SOAR)" awesome list.☆900Updated last year
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆859Updated 3 years ago
- A collection of resources for Threat Hunters☆909Updated last year
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆796Updated last month
- TrustedSec Sysinternals Sysmon Community Guide☆1,248Updated 4 months ago
- Re-play Security Events☆1,694Updated last year