chandrasekarrathinam / infosecLinks
Cyber | Cloud Security Checklist | Incident Response | Policy Template | Use cases
☆13Updated 4 years ago
Alternatives and similar repositories for infosec
Users that are interested in infosec are comparing it to the libraries listed below
Sorting:
- Sharing Threat Hunting runbooks☆26Updated 5 years ago
- Incident Response Plan for all major incidents including cheatsheets for both linux and windows☆14Updated 5 years ago
- MITRE ATT&CK Based App in Power BI☆16Updated last year
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆23Updated 4 months ago
- Incident Response Playbooks☆14Updated 6 years ago
- ☆11Updated 4 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆44Updated last year
- List of custom developed KQL queries to help proactive security teams hunt for opportunistic and sophisticated threat activity by develop…☆26Updated 3 years ago
- A collection of Sigma rules organized by MITRE ATT&CK technique☆17Updated 3 years ago
- ☆19Updated 3 years ago
- FIles and guides related to using Elasticstack as a SIEM☆12Updated 5 years ago
- Workflows for Shuffle☆23Updated 2 years ago
- Hunting Queries for Microsoft Defender Security Center https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defe…☆39Updated 4 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆27Updated 4 years ago
- Incident Response Report Using GitHub-Sphinx☆20Updated 5 years ago
- SIEM Detection Use Case Library mapped to MITRE ATT&CK tactics and techniques☆12Updated 6 years ago
- Cheat sheets for threat hunting, detection and other stuff.☆34Updated 2 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆52Updated 2 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- URL fingerprinting made easy☆86Updated last year
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆34Updated 2 months ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆36Updated last year
- Zerofox Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆37Updated 5 years ago
- SigmaHQ pySigma CrowdStrike processing pipeline☆26Updated 8 months ago
- ☆16Updated 4 years ago
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆35Updated 2 years ago
- ☆11Updated 3 years ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆47Updated 2 weeks ago
- Reference sheet for Threat Hunting Professional Course☆25Updated 6 years ago