deeso / fleet-deployment
☆15Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for fleet-deployment
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆22Updated 5 years ago
- ☆12Updated 5 years ago
- ☆14Updated 4 years ago
- PowerSponse is a PowerShell module focused on targeted containment and remediation during incident response.☆38Updated 2 years ago
- Integrating Sysinternals Autoruns’ logs into Security Onion☆31Updated 9 months ago
- A few quick recipes for those that do not have much time during the day☆21Updated 3 weeks ago
- Build Automated Machine Images for MISP☆28Updated last year
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- pollen - A command-line tool for interacting with TheHive☆34Updated 5 years ago
- OSSEC Decoder & Rulesets for Sysmon Events☆15Updated 9 years ago
- automate your MISP installs☆66Updated 4 years ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆34Updated last year
- Splunk App to assist Sysmon Threat Hunting☆38Updated 7 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆52Updated last week
- This repository is created to add value to existing Network Security Monitoring solutions.☆16Updated 8 years ago
- incident response scripts☆18Updated 5 years ago
- ☆14Updated 3 years ago
- Build your own threat hunting maturity model☆12Updated 7 years ago
- Simple Docker-based quickstart for osquery, Fleet, and ELK stack☆60Updated last year
- Incident Response Playbooks☆14Updated 5 years ago
- Expert Investigation Guides☆50Updated 3 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆37Updated last year
- Scripts used to create ISO installers of ROCK for offline installation.☆10Updated last year
- Threat intelligence and threat detection indicators (IOC, IOA)☆53Updated 3 years ago
- Old home of LimaCharlie, open source EDR☆28Updated last year
- ☆29Updated 6 years ago
- Use DNS to hunt for threats including DGAs☆14Updated 8 years ago