ericiussecurity / vCISO-Tools
Some of the tools we use during vCISO engagements
☆14Updated 2 years ago
Related projects: ⓘ
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆73Updated 2 years ago
- Any good cybersecurity program needs the policies and plans to get it started and give it direction. This is our take on a starting point☆15Updated last year
- A collection of various SIEM rules relating to malware family groups.☆60Updated 3 months ago
- Conference presentations☆45Updated 11 months ago
- MISP to Sentinel integration☆57Updated last week
- ☆40Updated last year
- Cybersecurity Incident Response Plan☆86Updated 3 years ago
- ☆24Updated 10 months ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆113Updated 9 months ago
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆36Updated 3 years ago
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆75Updated 4 months ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆23Updated 2 years ago
- Microsoft Threat Protection Advance Hunting Cheat Sheet☆76Updated 4 years ago
- Repository of public reference frameworks for the DFIR community.☆105Updated last year
- ☆50Updated last year
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆93Updated 6 months ago
- A list of resources to build a information security team.☆13Updated 3 years ago
- Some important DFIR Resources☆81Updated last year
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆68Updated 9 months ago
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆115Updated last month
- Resources To Learn And Understand SIGMA Rules☆163Updated last year
- Content Repo for Demystifying KQL Tutorial Series☆64Updated 3 weeks ago
- A curated list of awesome threat detection and hunting resources☆16Updated 6 years ago
- User Feedback Space of #MitreAssistant☆37Updated last year
- Cyber Defence related kusto queries for use in Azure Sentinel and Defender advanced hunting☆54Updated last week
- SentinelOne STAR Rules☆45Updated 10 months ago
- ☆68Updated last year
- Security Scripts and Sources for daily usage.☆44Updated last week
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆122Updated last year
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆189Updated 10 months ago