Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General
☆24Dec 16, 2021Updated 4 years ago
Alternatives and similar repositories for IRM
Users that are interested in IRM are comparing it to the libraries listed below
Sorting:
- Incident Response Playbooks☆15Jun 10, 2019Updated 6 years ago
- ☆48Oct 28, 2022Updated 3 years ago
- A collection of Python resources for Blue Team security work☆16Sep 23, 2018Updated 7 years ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- Import AbuseCH IOC Feeds into MISP☆12Feb 17, 2021Updated 5 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆51Apr 25, 2024Updated last year
- A quick bash script that I created in order to speed up the creation of usable kali boxes.☆11Oct 29, 2021Updated 4 years ago
- Small Python-based web application honeypot with built-in analysis tools.☆12Sep 15, 2019Updated 6 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆46Jan 2, 2022Updated 4 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- Finding your secret(Credential, API Key, AWS Key, Token, etc.) in your source code, files☆17Jan 26, 2026Updated last month
- Book Introduction Page☆19Aug 10, 2023Updated 2 years ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- Sunburst IOCs for Splunk Ingest☆18Jan 28, 2021Updated 5 years ago
- Splunk app to compare Endpoint Detection and Response solutions based on MITRE ATT&CK evaluations (APT3, APT29, Carbanak + FIN7, Wizard S…☆19Sep 5, 2022Updated 3 years ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Apr 10, 2024Updated last year
- CCP, Kesha Williams, 11-5-2020☆20Jul 6, 2023Updated 2 years ago
- ☆44Nov 30, 2022Updated 3 years ago
- ☆77Feb 4, 2026Updated 3 weeks ago
- Azure AD Incident Response☆27Oct 8, 2021Updated 4 years ago
- My first trial at Ethical Hacking Write Ups☆23Jul 23, 2020Updated 5 years ago
- Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.☆29Apr 10, 2024Updated last year
- A curated list of KAPE-related resources☆182May 1, 2025Updated 10 months ago
- ☆26Jun 22, 2022Updated 3 years ago
- AppLocker hardening policies☆26Jul 26, 2018Updated 7 years ago
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆27Sep 21, 2020Updated 5 years ago
- A system that creates a bogus web structure to entrap and delay web scanners☆66May 27, 2021Updated 4 years ago
- Cyber Incident Response Team Playbook Battle Cards☆423May 10, 2024Updated last year
- ☆37Nov 22, 2023Updated 2 years ago
- In-the-wild deepfake detection dataset☆14Mar 5, 2025Updated 11 months ago
- All the IOC's I have gathered which are used directly involved coronavirus / covid-19 / SARS-CoV-2 cyber attack campaigns☆65Apr 11, 2021Updated 4 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆39May 3, 2021Updated 4 years ago
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,541Jul 28, 2024Updated last year
- ☆37Dec 17, 2020Updated 5 years ago
- ☆42Dec 22, 2020Updated 5 years ago
- Reads and prints information from the website MalAPI.io☆39Jan 18, 2022Updated 4 years ago
- Where we learn together about MY₿ONK's NixOS automagic.☆15Updated this week
- Implementing ISO/IEC 27001:2022, by EC-Council☆15Feb 20, 2026Updated last week
- Machine Learning-based tool for Cybersecurity Risk Assessment☆11Jul 18, 2021Updated 4 years ago