cheerscyber / materialsLinks
Materials used by Product Management and Product Marketing
☆12Updated 6 years ago
Alternatives and similar repositories for materials
Users that are interested in materials are comparing it to the libraries listed below
Sorting:
- Tools for AWS forensics☆63Updated 9 years ago
- read the docs version of risk management☆25Updated 2 years ago
- A repository for wardley maps related to security topics.☆46Updated 8 years ago
- ☆35Updated 4 years ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 5 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 7 years ago
- Docs: Vulnerability management aggregation of AppSec & OpSec (Tools Listing)☆31Updated 2 years ago
- A curated threat modeling library collection☆22Updated last year
- Materials used and mentioned during my talk at SANS Cloud Security Summit 2018 in San Diego☆23Updated 7 years ago
- This script is used to generate some basic detections of the aws security services☆71Updated 3 years ago
- Security Scanner based on CIS benchmark 1.1 inspired by Scout2☆53Updated 2 years ago
- Updated incident response generator for training classes☆44Updated 4 years ago
- OWASP Foundation Web Respository☆27Updated 2 weeks ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆48Updated 8 years ago
- A packer utility to create and capture DFIR Image for use AWS & Azure☆15Updated 5 years ago
- Sharing Threat Hunting runbooks☆26Updated 6 years ago
- Salesforce Policy Deviation Checker☆30Updated 4 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 8 months ago
- misp-cloud - Cloud-ready images of MISP☆73Updated 2 years ago
- A Lambda-powered Security Orchestration framework for AWS GuardDuty☆52Updated 5 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Updated 2 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆74Updated 3 years ago
- generate lookalike domains using a few simple techniques (homoglyphs, alt TLDs, prefix/suffix)☆32Updated last year
- Legal, procedural and policies document templates for operating an IRT☆64Updated last year
- A collection of notebooks built for defensive and offensive operations.☆77Updated 4 years ago
- ☆19Updated 3 years ago
- Systematic Universal Security Testing Orchestration☆37Updated 3 years ago
- Table Top Exercise (TTX) for Computer Security Incident Response (CSIRT) teams. The templatized artifacts provided will hopefully help te…☆37Updated 4 years ago
- Push-button Security Operations Center using Kubernetes☆12Updated 8 years ago
- Vendor Security Model Contract☆98Updated 3 years ago