glallen01 / csirt-essential-reading
Reading List for CSIRT Team Members
☆17Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for csirt-essential-reading
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 7 years ago
- This repository is a curated list of pro bono incident response entities.☆19Updated last year
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- Network Forensics Workshop Files☆17Updated 9 years ago
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆66Updated 9 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆40Updated 4 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Updated 9 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- Incident Response Scripts☆30Updated 4 years ago
- Open Development projects for TekDefense☆77Updated 8 years ago
- Python script to pull various IOCs from PDFs☆15Updated 9 years ago
- Maltego Transform to put entities into MISP events☆26Updated 3 years ago
- Cli interface to threatcrowd.org☆19Updated 7 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Home to the ActorTrackr source code☆24Updated 7 years ago
- Modular tool to test exfiltration techniques.☆36Updated 7 years ago
- Transforms for the AlienVault OTX service☆39Updated 8 years ago
- mindmap created for tools can be used during analysis/investigation☆27Updated 7 years ago
- Some YARA rules i will add from time to time☆12Updated 5 years ago
- ☆16Updated 9 years ago
- ☆9Updated 7 years ago
- Extract information from MISP via the API☆15Updated 8 years ago
- Maltego transforms for the ThreatCrowd search API☆46Updated 6 years ago
- ☆29Updated 6 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆21Updated 6 years ago
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆21Updated 6 years ago
- Some IR notes☆73Updated 8 years ago