cisagov / orchestrator
Orchestrate gatherer, scanner, saver, and trustymail_reporter
☆14Updated this week
Related projects ⓘ
Alternatives and complementary repositories for orchestrator
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆16Updated 2 weeks ago
- A few quick recipes for those that do not have much time during the day☆21Updated last week
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆24Updated last year
- Virtual machines that are set up with a variety of known vulnerabilities.☆12Updated 2 years ago
- ☆11Updated 3 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆25Updated 10 months ago
- Automated pshtt, trustymail, and sslyze scanning☆24Updated 2 months ago
- ☆11Updated 3 years ago
- Various components we use in labs☆10Updated 4 years ago
- ☆14Updated 3 years ago
- This script provides a Python library with methods to authenticate to various sources of threat intelligence and query IPs for the latest…☆18Updated 2 years ago
- Search a filesystem for indicators of compromise (IoC).☆68Updated 2 months ago
- ☆11Updated 3 years ago
- This repo contains information on how to auto deploy Sysmon via GPO and Task Scheduler☆12Updated 3 years ago
- Azure AD Incident Response☆24Updated 3 years ago
- General Content☆20Updated 3 months ago
- Sharing Threat Hunting runbooks☆24Updated 5 years ago
- ☆15Updated 2 years ago
- Automatic detection engineering technical state compliance☆50Updated 4 months ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆60Updated 7 months ago
- Bloodhound Portable for Windows☆51Updated last year
- SIEM USE Case Selection Methodology☆15Updated 4 years ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆17Updated 8 months ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆52Updated 3 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 4 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆11Updated last year
- Build a domain with three quick PowerShell scripts!☆28Updated 4 years ago
- US Government controls formatted for usability☆17Updated 3 years ago