bluemountaincyber / avoiding-data-disasters
☆12Updated last year
Alternatives and similar repositories for avoiding-data-disasters:
Users that are interested in avoiding-data-disasters are comparing it to the libraries listed below
- The ultimate solution for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆22Updated 5 months ago
- ☆41Updated 10 months ago
- Open Threat-Informed Detection Engineering☆37Updated last month
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆65Updated 9 months ago
- Cyber Defence related kusto queries for use in Azure Sentinel and Defender advanced hunting☆62Updated last month
- Security Scripts and Sources for daily usage.☆52Updated this week
- A collection of various SIEM rules relating to malware family groups.☆65Updated 7 months ago
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs☆52Updated last year
- ADXFlowmaster helps SecOps teams Threat Hunt suspicious network traffic inside & outside of Azure.☆31Updated 3 months ago
- Conference presentations☆47Updated last year
- ☆15Updated last year
- ☆13Updated 11 months ago
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆18Updated last year
- ☆37Updated 2 months ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆109Updated 2 months ago
- Docker Crash Course: How to containerize your favorite security tools☆27Updated last year
- ☆42Updated 2 years ago
- Automating Security Detection Engineering, published by Packt☆52Updated 4 months ago
- Cybersecurity Incident Response Plan☆88Updated 4 years ago
- ☆46Updated 2 weeks ago
- Generate a matrix based on an inventory of InfoSec tools☆23Updated 7 months ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆23Updated 3 years ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆52Updated last year
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆38Updated 9 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆91Updated last year
- ☆99Updated last month
- A tool that allows you to document and assess any security automation in your SOC☆45Updated 3 months ago
- Repository with supporting materials for Invictus Academy/Training☆42Updated last month
- Slides of my public talks☆54Updated last year
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆75Updated 8 months ago