glallen01 / csirt-essential-reading
Reading List for CSIRT Team Members
☆17Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for csirt-essential-reading
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 7 years ago
- Network Forensics Workshop Files☆17Updated 9 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆40Updated 4 years ago
- Home to the ActorTrackr source code☆24Updated 7 years ago
- This repository is a curated list of pro bono incident response entities.☆19Updated last year
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Updated 9 years ago
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆66Updated 9 years ago
- Small scripts for doing repeatable tasks☆25Updated 2 years ago
- Python script to pull various IOCs from PDFs☆15Updated 9 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆41Updated 7 years ago
- Some IR notes☆73Updated 8 years ago
- Deploy MISP Project software with Vagrant.☆42Updated 4 years ago
- Maltego Transform to put entities into MISP events☆26Updated 3 years ago
- Passive Network Audit Framework☆32Updated 6 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated last year
- Extract information from MISP via the API☆15Updated 8 years ago
- OSSEC Decoder & Rulesets for Sysmon Events☆15Updated 9 years ago
- SANS Hunting on the Cheap☆35Updated 8 years ago
- ☆18Updated 6 years ago
- Python bindings for Yeti's API☆18Updated last year
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆17Updated 5 years ago
- Threat Intelligence distribution☆30Updated 8 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Updated 6 years ago
- A warehouse for your malware☆133Updated 11 years ago
- Normalizer for honeypot data.☆45Updated 9 years ago