dfir-dd / incident-response-playbooksView external linksLinks
Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents
☆51Apr 25, 2024Updated last year
Alternatives and similar repositories for incident-response-playbooks
Users that are interested in incident-response-playbooks are comparing it to the libraries listed below
Sorting:
- Incident Response Playbooks☆15Jun 10, 2019Updated 6 years ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Dec 16, 2021Updated 4 years ago
- Cyber Incident Response Team Playbook Battle Cards☆426May 10, 2024Updated last year
- ☆47Oct 28, 2022Updated 3 years ago
- ☆58Mar 4, 2022Updated 3 years ago
- A few quick recipes for those that do not have much time during the day☆22Oct 28, 2024Updated last year
- A generic security incident response playbook investigating and responding to potential compromises of Okta's internal systems, in the co…☆20Mar 24, 2022Updated 3 years ago
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆158Nov 30, 2021Updated 4 years ago
- Tools for parsing Forensic images☆41Dec 14, 2018Updated 7 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- A curated list of KAPE-related resources☆179May 1, 2025Updated 9 months ago
- Cybersecurity Incident Response Plan☆109Oct 2, 2020Updated 5 years ago
- Ripple20 Critical Vulnerabilities - Detection Logic and Signatures☆12May 28, 2021Updated 4 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- Digital Forensics and Incident Response notes and Autopsy tool walkthrough☆11Feb 3, 2022Updated 4 years ago
- SIEM USE Case Selection Methodology☆17Sep 18, 2020Updated 5 years ago
- Useful windows tools for Blue, Red & Purple teams☆11Updated this week
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆45Jan 2, 2022Updated 4 years ago
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 12 years ago
- Scanner for certain IoCs☆11Jan 29, 2025Updated last year
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆61Jan 6, 2023Updated 3 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Jul 26, 2020Updated 5 years ago
- A homebrewed cyber threat intelligence solution☆20Nov 20, 2012Updated 13 years ago
- An improvised Automated Threat Intelligent System with advanced vulnerability scanners and Opensource Intelligence Information gathering …☆10Jan 23, 2019Updated 7 years ago
- The "DFUR" Splunk application and data that was presented at the 2020 SANS DFIR Summit.☆13Sep 9, 2020Updated 5 years ago
- Tools to install w3af as a Python module☆10Jul 24, 2015Updated 10 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- This is a CLI tool to check a csv of email addresses and user names in https://haveibeenpwned.com☆13Jul 13, 2018Updated 7 years ago
- Power BI connector that provides insight into the current state of how Microsoft 365 is configured and whether best practices have been i…☆13Oct 2, 2020Updated 5 years ago
- Open source alternative to Burpsuite☆15May 18, 2021Updated 4 years ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆13Jun 13, 2023Updated 2 years ago
- Presentation Slides and Video links☆32Nov 8, 2021Updated 4 years ago
- Automatic detection engineering technical state compliance☆55Jul 7, 2024Updated last year
- MalwareAnalysis☆12Dec 19, 2020Updated 5 years ago
- ☆14Aug 21, 2022Updated 3 years ago
- Threat Detection System using Hybrid (Machine Learning + Lexical Analysis) learning Approach.☆11May 30, 2017Updated 8 years ago
- DFIRTrack - The Incident Response Tracking Application☆532Jan 13, 2026Updated last month
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆39Dec 17, 2025Updated 2 months ago