Cybersecurity Incident Response Plan
☆108Oct 2, 2020Updated 5 years ago
Alternatives and similar repositories for gsvsoc_cybersecurity-incident-response-plan
Users that are interested in gsvsoc_cybersecurity-incident-response-plan are comparing it to the libraries listed below
Sorting:
- Incident Response Report Using GitHub-Sphinx☆20Oct 28, 2019Updated 6 years ago
- Cyber Incident Response Team Playbook Battle Cards☆424May 10, 2024Updated last year
- Incident Response Playbooks☆15Jun 10, 2019Updated 6 years ago
- A concise, directive, specific, flexible, and free incident response plan template☆759May 7, 2024Updated last year
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆51Apr 25, 2024Updated last year
- TheHiveIRPlaybook is a collection of TheHive case templates used for Incident Response☆13Jul 13, 2020Updated 5 years ago
- A homebrewed cyber threat intelligence solution☆20Nov 20, 2012Updated 13 years ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆18Oct 28, 2023Updated 2 years ago
- ☆17Sep 9, 2020Updated 5 years ago
- ☆28Nov 25, 2025Updated 3 months ago
- Free incident cyber response plan template☆49Aug 19, 2025Updated 6 months ago
- ☆19Nov 23, 2022Updated 3 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Jun 15, 2021Updated 4 years ago
- Incident Response Plan for all major incidents including cheatsheets for both linux and windows☆13Jun 4, 2020Updated 5 years ago
- ☆30Nov 15, 2018Updated 7 years ago
- PowerShell Memory Pulling script☆19Mar 24, 2015Updated 10 years ago
- Incident Response Methodologies☆1,018Aug 2, 2018Updated 7 years ago
- Windows Forensics Environment Builder☆180Dec 5, 2025Updated 3 months ago
- Incident Response with Threat Intelligence, published by Packt☆57Apr 18, 2024Updated last year
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,544Jul 28, 2024Updated last year
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Dec 16, 2021Updated 4 years ago
- ☆12Sep 10, 2022Updated 3 years ago
- All-in-one bundle of MISP, TheHive and Cortex☆170Sep 27, 2022Updated 3 years ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆341Dec 3, 2025Updated 3 months ago
- Incident Response Methodologies 2022☆1,106Apr 11, 2025Updated 10 months ago
- DFIRTrack - The Incident Response Tracking Application☆533Jan 13, 2026Updated last month
- Sharing Threat Hunting runbooks☆25Jul 5, 2019Updated 6 years ago
- Disk Image Mounting Script☆11Jan 22, 2026Updated last month
- CLI generator for Velociraptor offline collector☆16Oct 10, 2025Updated 4 months ago
- Python script for carving Bitlocker VMK keys☆26Feb 4, 2026Updated last month
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- A free incident response management and documentation workbook☆25Nov 13, 2018Updated 7 years ago
- OWASP Foundation Web Respository☆32Oct 11, 2025Updated 4 months ago
- Defender Resource Hub☆30Feb 23, 2026Updated 2 weeks ago
- Phantom Community Playbooks☆530Jan 22, 2026Updated last month
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Mar 29, 2017Updated 8 years ago
- Scripts to for ready-to-use Velociraptor instance deployment in Azure☆14Jun 27, 2023Updated 2 years ago
- Hunt the windows Registry automatically using VQL☆14Jan 6, 2026Updated 2 months ago
- A modern approach to password rotation for the local administrator account on Windows 10 workstations utilizing Microsoft Endpoint Config…☆11May 5, 2020Updated 5 years ago