ericiussecurity / ProjectKeystone
Any good cybersecurity program needs the policies and plans to get it started and give it direction. This is our take on a starting point
☆18Updated last year
Alternatives and similar repositories for ProjectKeystone:
Users that are interested in ProjectKeystone are comparing it to the libraries listed below
- Some of the tools we use during vCISO engagements☆15Updated 2 years ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆71Updated 3 months ago
- Tools for simulating threats☆181Updated last year
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆113Updated 4 months ago
- Backdoors & Breaches: Campaigns. These are short guides to help Incident Captains by giving them game ideas based on actual breaches.☆34Updated last year
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆123Updated 2 weeks ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆67Updated 4 years ago
- links collected from SOC Core Skills class☆85Updated 4 years ago
- Repository of public reference frameworks for the DFIR community.