Reading List for CSIRT Team Members
☆17Oct 21, 2019Updated 6 years ago
Alternatives and similar repositories for csirt-essential-reading
Users that are interested in csirt-essential-reading are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A LaTeX class for memos.☆22Mar 29, 2026Updated last month
- ☆11Mar 9, 2018Updated 8 years ago
- OSSEC Decoder & Rulesets for Sysmon Events☆15Jul 23, 2015Updated 10 years ago
- Solutions from multiple CTFs we have played.☆11Oct 16, 2018Updated 7 years ago
- Set of PoC for exploits for QRadar SIEM☆15Jan 14, 2018Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Bash one-liners☆28Oct 17, 2013Updated 12 years ago
- Bash has two input modes - emacs and vi. This is emacs input/editing mode keyboard shortcut cheat sheet.☆37Mar 26, 2017Updated 9 years ago
- bro on debian with elasticsearch support☆24Mar 27, 2017Updated 9 years ago
- This is the bash history cheat sheet. It summarizes everything there is to know about working efficiently with command line history in ba…☆55Nov 26, 2009Updated 16 years ago
- Automated deployment scripts for the RockNSM network hunting distribution.☆456Jul 2, 2023Updated 2 years ago
- Logging plugin to bro to send logs to a Kafka broker☆20Nov 29, 2017Updated 8 years ago
- Premantel - A Malware analysis and Threat Intel Framework☆36Mar 22, 2019Updated 7 years ago
- Plaform independent reverse shell over https☆11Mar 2, 2020Updated 6 years ago
- Passive network mapping tool written in Ruby☆15Apr 8, 2014Updated 12 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Small bash function library to turn on bash options that enhance robustness of scripts.☆17Apr 17, 2025Updated last year
- A curated list of tools for incident response☆34Mar 2, 2024Updated 2 years ago
- Log File analysis and visualization for Clojure☆25Apr 13, 2013Updated 13 years ago
- Repository for Security Workshop content☆20Sep 4, 2017Updated 8 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆60Aug 3, 2019Updated 6 years ago
- Network Security Monitoring Console☆22Feb 3, 2010Updated 16 years ago
- My emacs configuration.☆10Updated this week
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Aug 21, 2018Updated 7 years ago
- Post-explotation Hacks☆14Jan 6, 2019Updated 7 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- set of bash scripts to get a list of bad reputation IP addresses☆11Dec 17, 2015Updated 10 years ago
- PacketSled's Bro AMQP Writer Plugin☆11Aug 5, 2016Updated 9 years ago
- ☆26Mar 1, 2017Updated 9 years ago
- ☆14Sep 24, 2012Updated 13 years ago
- My emacs configuration☆10Dec 30, 2016Updated 9 years ago
- DHCP Snooping app - great for finding rogue DHCP servers☆35Jan 25, 2018Updated 8 years ago
- An API connector for the Office 365 Management API and the Elastic Stack☆19Aug 9, 2018Updated 7 years ago
- LILLY - Latex Framework☆12Jul 29, 2021Updated 4 years ago
- Almost portable emacs settings☆12Jul 26, 2014Updated 11 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Scripts to maintain Security Onion servers in an airgapped environment.☆10Mar 13, 2017Updated 9 years ago
- Graphical model of a TCP/IP stack which can be used as a cheatsheet when developing BPF filters.☆16Dec 10, 2019Updated 6 years ago
- Produce animated SVG from recorded script sessions☆21Jul 25, 2015Updated 10 years ago
- ☆11Oct 16, 2022Updated 3 years ago
- Network Security Monitoring Framework☆49Oct 19, 2012Updated 13 years ago
- Validates yara rules and tries to repair the broken ones.☆41Sep 5, 2020Updated 5 years ago
- Files for the course Offensive Computer Security 2014 (FSU)☆12May 20, 2015Updated 10 years ago