brennodewinter / Informatiebeveiligingsonderzoek
Methodiek voor Informatiebeveiligingsonderzoek met Auditwaarde
☆20Updated 4 months ago
Alternatives and similar repositories for Informatiebeveiligingsonderzoek
Users that are interested in Informatiebeveiligingsonderzoek are comparing it to the libraries listed below
Sorting:
- Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (p…☆34Updated 5 years ago
- Intrusion Detection Honeypots Book Code☆25Updated 4 years ago
- ☆41Updated 2 years ago
- Azure function to insert MISP data in to Azure Sentinel☆32Updated 2 years ago
- Ingesting Shodan Monitor Alerts to Microsoft Sentinel☆34Updated last year
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 6 months ago
- The gse-study repo was assembled to serve as a consolidated, and comprehensive, study solution for the SANS GSE exam.☆25Updated 6 years ago
- A tool to assess the compliance of a VMware vSphere environment against the CIS Benchmark.☆51Updated 2 years ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- ☆62Updated 3 years ago
- AIL project training materials☆29Updated 3 months ago
- ☆17Updated 3 years ago
- ☆65Updated 2 months ago
- The Intelligent Process Lifecycle of Active Cyber Defenders☆31Updated 2 years ago
- ☆21Updated 2 years ago
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆37Updated 3 years ago
- My Jupyter Notebooks☆36Updated 2 months ago
- HIBP Audit - Audit Active Directory user accounts against HIBP☆15Updated 3 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- Powershell Scripts to work on Crowdstrike Falcon that pull back raw data relevant to forensic investigation☆22Updated 5 months ago
- Builds a hashmap of AD NTLM hashes/usernames and iterates through a second list of hashes checking for the existence of each entry in the…☆77Updated 4 years ago
- ☆54Updated 3 years ago
- ☆16Updated 2 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 3 years ago
- Quick lookup files for SUNBURST Backdoor☆12Updated 4 years ago
- Documentation on the Cyber Defense Matrix☆24Updated 2 years ago
- Home for TRANSITS materials☆25Updated 9 months ago
- A quick and easy PowerShell script to collect a packet trace with option to convert .etl to .pcap.☆40Updated 2 years ago
- This script provides a Python library with methods to authenticate to various sources of threat intelligence and query IPs for the latest…☆18Updated 3 months ago
- This is a collection of Security Baselines that I use in my virtual lab environment.☆21Updated 5 years ago