ericiussecurity / ProjectKeystone
Any good cybersecurity program needs the policies and plans to get it started and give it direction. This is our take on a starting point
☆15Updated last year
Related projects: ⓘ
- Some of the tools we use during vCISO engagements☆14Updated 2 years ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆23Updated 2 years ago
- ☆40Updated last year
- Conference presentations☆45Updated 11 months ago
- InsightVM helpful SQL queries☆57Updated 3 months ago
- Tools for simulating threats☆170Updated 10 months ago
- Cybersecurity Incident Response Plan☆86Updated 3 years ago
- ☆50Updated last year
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆67Updated 3 weeks ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆113Updated 9 months ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆64Updated 4 years ago
- Resources for SANS CTI Summit 2021 presentation☆102Updated 10 months ago
- DigitalShadows Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆35Updated 5 years ago
- The PoLRBear Project☆35Updated 3 years ago
- A port of BHIS's Backdoors & Breaches for playingcards.io☆59Updated last year
- links collected from SOC Core Skills class☆84Updated 3 years ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆119Updated this week
- Repository of public reference frameworks for the DFIR community.☆105Updated last year
- ☆52Updated 3 years ago
- Docker Crash Course: How to containerize your favorite security tools☆27Updated last year
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆93Updated 6 months ago
- ☆40Updated 4 months ago
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆73Updated 2 years ago
- Backdoors & Breaches: Campaigns. These are short guides to help Incident Captains by giving them game ideas based on actual breaches.☆31Updated 9 months ago
- ☆83Updated 2 years ago
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆75Updated 4 months ago
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆36Updated 2 years ago
- This repository is a comprehensive collection of resources, documentation, apps, and add-ons related to Splunk, a powerful data analytics…☆20Updated this week
- Generate Indexes from SANS PDFs☆15Updated 3 months ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆108Updated last year