cisagov / orchestrator
Orchestrate gatherer, scanner, saver, and trustymail_reporter
☆14Updated 2 weeks ago
Related projects ⓘ
Alternatives and complementary repositories for orchestrator
- A few quick recipes for those that do not have much time during the day☆21Updated 3 weeks ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆16Updated 3 weeks ago
- ☆14Updated 3 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆25Updated 10 months ago
- ☆11Updated 3 years ago
- Various components we use in labs☆10Updated 4 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆12Updated 2 years ago
- Automated pshtt, trustymail, and sslyze scanning☆24Updated 2 months ago
- Azure AD Incident Response☆24Updated 3 years ago
- Sharing Threat Hunting runbooks☆24Updated 5 years ago
- PowerSponse is a PowerShell module focused on targeted containment and remediation during incident response.☆38Updated 2 years ago
- US Government controls formatted for usability☆17Updated 3 years ago
- A collection of PowerShell modules for interacting with the Shodan API. Includes modules for returning information about the API, client …☆23Updated 3 months ago
- ☆11Updated 3 years ago
- Use SQL to instantly query file, domain, URL and IP scanning results from VirusTotal.☆22Updated 3 weeks ago
- Table Top Exercise (TTX) for Computer Security Incident Response (CSIRT) teams. The templatized artifacts provided will hopefully help te…☆36Updated 4 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆24Updated last year
- Build a domain with three quick PowerShell scripts!☆28Updated 4 years ago
- Visual Studio Code Microsoft Sysinternal Sysmon configuration file extension.☆51Updated last year
- This script provides a Python library with methods to authenticate to various sources of threat intelligence and query IPs for the latest…☆18Updated 2 years ago
- Threat Simulator for Enterprise Networks☆14Updated 2 years ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆31Updated 3 weeks ago
- Create a windows Active Directory lab☆13Updated 5 years ago
- Incident Response Report Using GitHub-Sphinx☆19Updated 5 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆31Updated last year
- Threat Hunter's Knowledge Base☆22Updated 2 years ago
- Corelight@Home script☆40Updated last year
- SIEM USE Case Selection Methodology☆15Updated 4 years ago