ericiussecurity / ProjectKeystone
Any good cybersecurity program needs the policies and plans to get it started and give it direction. This is our take on a starting point
☆17Updated last year
Related projects ⓘ
Alternatives and complementary repositories for ProjectKeystone
- Some of the tools we use during vCISO engagements☆14Updated 2 years ago
- Tools for simulating threats☆177Updated last year
- ☆41Updated 2 years ago
- Conference presentations☆47Updated last year
- Scripts for rapid Windows endpoint "tactical triage" and investigations with Velociraptor and KAPE☆105Updated 2 weeks ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆66Updated 4 years ago
- ☆54Updated 3 years ago
- MISP to Sentinel integration☆60Updated this week
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆112Updated last month
- ☆52Updated last year
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆75Updated 6 months ago
- Cybersecurity Incident Response Plan☆87Updated 4 years ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆23Updated 2 years ago
- ☆53Updated 3 years ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆122Updated 3 weeks ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆97Updated this week
- Repository of attack and defensive information for Business Email Compromise investigations☆230Updated 2 months ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆116Updated 11 months ago
- ☆66Updated 8 months ago
- InsightVM helpful SQL queries☆59Updated 5 months ago
- Backdoors & Breaches: Campaigns. These are short guides to help Incident Captains by giving them game ideas based on actual breaches.☆32Updated 11 months ago
- Practical Threat Detection Engineering, Published by Packt☆59Updated last year
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆69Updated last month
- A list of Splunk queries that I've collected and used over time.☆72Updated 4 years ago
- links collected from SOC Core Skills class☆84Updated 3 years ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆204Updated last year
- Repository of SentinelOne Deep Visibility queries.☆119Updated 3 years ago
- Repository of public reference frameworks for the DFIR community.☆109Updated last year
- Real-time Response scripts and schema☆104Updated 11 months ago
- ☆80Updated 2 months ago