brennodewinter / Informatiebeveiligingsonderzoek
Methodiek voor Informatiebeveiligingsonderzoek met Auditwaarde
☆18Updated 2 months ago
Alternatives and similar repositories for Informatiebeveiligingsonderzoek:
Users that are interested in Informatiebeveiligingsonderzoek are comparing it to the libraries listed below
- Ingesting Shodan Monitor Alerts to Microsoft Sentinel☆34Updated last year
- This is a collection of Security Baselines that I use in my virtual lab environment.☆21Updated 4 years ago
- ☆41Updated last year
- OpenIOC rules to facilitate hunting for indicators of compromise☆38Updated 3 years ago
- Scapy packet fragment reassembly engines☆34Updated 4 years ago
- Open platform for sharing malware distribution sites☆37Updated 3 months ago
- Azure function to insert MISP data in to Azure Sentinel☆31Updated 2 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆48Updated 2 years ago
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆36Updated 2 years ago
- A tool that allows you to document and assess any security automation in your SOC☆45Updated 3 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated last month
- Automatically exported from code.google.com/p/nipper-ng☆69Updated 2 years ago
- ☆39Updated 2 years ago
- Collection of resources related to the Center for Threat-Informed Defense☆77Updated 9 months ago
- A tool to assess the compliance of a VMware vSphere environment against the CIS Benchmark.☆49Updated 2 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- ☆60Updated 3 years ago
- Conference presentations☆47Updated last year
- Let's obscure some IPv4 addresses☆36Updated 2 years ago
- A collection of tips for using MISP.☆74Updated 2 months ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- This repository contains a script created by Truesec CSIRT team which can be used to identify signs of compromise and to some extent, mit…☆11Updated 3 years ago
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆25Updated 9 months ago
- Jupyter notebooks☆23Updated 4 years ago
- This script provides a Python library with methods to authenticate to various sources of threat intelligence and query IPs for the latest…☆18Updated this week
- Hunting Queries for Microsoft Defender Security Center https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defe…☆39Updated 3 years ago
- Collection of useful Canary tools☆75Updated this week
- Command line tool to get CVE useful info from any web report using the NVD database (NIST). Time saver for analysts.☆41Updated this week
- POSIX script for mail security checks of domain names☆75Updated last year
- Search a filesystem for indicators of compromise (IoC).☆70Updated last week