glallen01 / csirt-essential-reading
Reading List for CSIRT Team Members
☆17Updated 5 years ago
Alternatives and similar repositories for csirt-essential-reading:
Users that are interested in csirt-essential-reading are comparing it to the libraries listed below
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 7 years ago
- Cli interface to threatcrowd.org☆19Updated 7 years ago
- Extract information from MISP via the API☆15Updated 8 years ago
- Transforms for the AlienVault OTX service☆39Updated 8 years ago
- Network Forensics Workshop Files☆17Updated 9 years ago
- mindmap created for tools can be used during analysis/investigation☆27Updated 8 years ago
- Python scripts to parse scans.io ssl data and ingest into elasticsearch for searching☆33Updated 8 years ago
- Maltego Transform to put entities into MISP events☆26Updated 3 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆16Updated 9 years ago
- Home to the ActorTrackr source code☆24Updated 7 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- Threat Intelligence distribution☆30Updated 9 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆67Updated 9 years ago
- ☆29Updated 6 years ago
- Collection of information security policies.☆28Updated 7 years ago
- Modern Honey Net set-up and configure scripts to automate multiple installs.☆8Updated 7 years ago
- Scoring Engine for CTF competitions☆46Updated 2 years ago
- This repository is a curated list of pro bono incident response entities.☆20Updated last year
- integrating bro into yara☆33Updated 10 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- A set of templates for documenting threat intelligence☆74Updated 11 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆21Updated 6 years ago
- Honeypot log processor to create OTX Pulse entries☆29Updated last year
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Updated 5 years ago
- Python bindings for Yeti's API☆18Updated last year
- Tools to work with vulnerability standards.☆19Updated 10 years ago
- ☆18Updated 6 years ago