Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General
☆24Dec 16, 2021Updated 4 years ago
Alternatives and similar repositories for IRM
Users that are interested in IRM are comparing it to the libraries listed below
Sorting:
- Incident Response Playbooks☆15Jun 10, 2019Updated 6 years ago
- ☆49Oct 28, 2022Updated 3 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆51Apr 25, 2024Updated last year
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆46Jan 2, 2022Updated 4 years ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- Import AbuseCH IOC Feeds into MISP☆12Feb 17, 2021Updated 5 years ago
- ☆22Aug 29, 2024Updated last year
- A quick bash script that I created in order to speed up the creation of usable kali boxes.☆11Oct 29, 2021Updated 4 years ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- Azure AD Incident Response☆27Oct 8, 2021Updated 4 years ago
- Small Python-based web application honeypot with built-in analysis tools.☆12Sep 15, 2019Updated 6 years ago
- TheHiveIRPlaybook is a collection of TheHive case templates used for Incident Response☆13Jul 13, 2020Updated 5 years ago
- Book Introduction Page☆19Aug 10, 2023Updated 2 years ago
- A system that creates a bogus web structure to entrap and delay web scanners☆67May 27, 2021Updated 4 years ago
- Cyber Incident Response Team Playbook Battle Cards☆425May 10, 2024Updated last year
- ☆44Nov 30, 2022Updated 3 years ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Apr 10, 2024Updated last year
- Sunburst IOCs for Splunk Ingest☆18Jan 28, 2021Updated 5 years ago
- Splunk app to compare Endpoint Detection and Response solutions based on MITRE ATT&CK evaluations (APT3, APT29, Carbanak + FIN7, Wizard S…☆19Sep 5, 2022Updated 3 years ago
- A curated list of KAPE-related resources☆184May 1, 2025Updated 10 months ago
- In-the-wild deepfake detection dataset☆13Mar 5, 2025Updated last year
- Cybersecurity Incident Response Plan☆109Oct 2, 2020Updated 5 years ago
- Essential playbooks & runbooks for cybersecurity operations. A dynamic resource for security pros to navigate digital threats, with best …☆15Apr 14, 2025Updated 11 months ago
- Powershell Scripts to automatically deploy an image of a prebuilt VM (up-to-date and with pre-deployed tools and apps) to every region yo…☆20Jun 27, 2023Updated 2 years ago
- Incident Response Report Using GitHub-Sphinx☆20Oct 28, 2019Updated 6 years ago
- Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.☆29Apr 10, 2024Updated last year
- My first trial at Ethical Hacking Write Ups☆23Jul 23, 2020Updated 5 years ago
- petit "playbook" qui pourrait servir de base à une réponse à incident lors d'une attaque de type ransomware☆21Aug 30, 2022Updated 3 years ago
- ☆26Jun 22, 2022Updated 3 years ago
- Incident Response Plan for all major incidents including cheatsheets for both linux and windows☆13Jun 4, 2020Updated 5 years ago
- CCP, Kesha Williams, 11-5-2020☆20Jul 6, 2023Updated 2 years ago
- Track previous changes on specific AD accounts (users, computers) and Groups (online DC), even if event logs were wiped/not collected (e.…☆16Feb 25, 2025Updated last year
- AppLocker hardening policies☆26Jul 26, 2018Updated 7 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆39May 3, 2021Updated 4 years ago
- WiP - cve-search next gen☆13Jan 18, 2020Updated 6 years ago
- 🔹Home Assistant plugin that allows you to rearrange, hide, and add sidebar menu items.☆16Jun 13, 2025Updated 9 months ago
- OWASP Web Security Testing Guide RAG system with ChromaDB, MCP for Claude Code☆20Dec 11, 2025Updated 3 months ago
- Machine Learning-based tool for Cybersecurity Risk Assessment☆12Jul 18, 2021Updated 4 years ago
- ☆42Dec 22, 2020Updated 5 years ago