certsocietegenerale / IRM-deprecated
Incident Response Methodologies
☆1,024Updated 6 years ago
Alternatives and similar repositories for IRM-deprecated:
Users that are interested in IRM-deprecated are comparing it to the libraries listed below
- An informational repo about hunting for adversaries in your IT environment.☆1,765Updated 3 years ago
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,145Updated last year
- Detect Tactics, Techniques & Combat Threats☆2,133Updated 2 months ago
- Open Source Security Events Metadata (OSSEM)☆1,260Updated 2 years ago
- Configuration files for the SOF-ELK VM☆1,574Updated this week
- A collection of resources for Threat Hunters☆879Updated 5 months ago
- Actionable analytics designed to combat threats☆981Updated 2 years ago
- A collection of sources of indicators of compromise.☆845Updated 6 months ago
- Re-play Security Events☆1,629Updated last year
- An information security preparedness tool to do adversarial simulation.☆1,120Updated 6 years ago
- Documentation of TheHive☆395Updated last year
- A framework for developing alerting and detection strategies for incident response.☆728Updated 3 years ago
- Tools, techniques, cheat sheets, and other resources to assist those defending organizations and detecting adversaries☆446Updated 3 years ago
- A Powershell incident response framework☆1,592Updated 2 years ago
- CyLR - Live Response Collection Tool☆670Updated 2 years ago
- A knowledge base of actionable Incident Response techniques☆635Updated 2 years ago
- ☆1,069Updated 5 years ago
- Fast Incident Response☆1,853Updated last week
- A repository for using windows event forwarding for incident detection and response☆1,253Updated 7 months ago
- Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.☆913Updated last year
- Configuration guidance for implementing collection of security relevant Windows Event Log events by using Windows Event Forwarding. #nsac…☆862Updated 4 years ago
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆1,024Updated this week
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆896Updated last year
- Simple Bash IOC Scanner☆727Updated 3 years ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,510Updated 8 months ago
- Mapping the MITRE ATT&CK Matrix with Osquery☆790Updated last year
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,267Updated 2 months ago
- Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK☆1,066Updated 4 months ago
- Scripts and a (future) library to improve users' interactions with the ATT&CK content☆584Updated last year
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,448Updated last week