Incident Response Report Using GitHub-Sphinx
☆20Oct 28, 2019Updated 6 years ago
Alternatives and similar repositories for gsvsoc_mission-model
Users that are interested in gsvsoc_mission-model are comparing it to the libraries listed below
Sorting:
- Cybersecurity Incident Response Plan☆108Oct 2, 2020Updated 5 years ago
- TheHiveIRPlaybook is a collection of TheHive case templates used for Incident Response☆13Jul 13, 2020Updated 5 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Jun 15, 2021Updated 4 years ago
- Cyber Incident Response Team Playbook Battle Cards☆424May 10, 2024Updated last year
- A free incident response management and documentation workbook☆25Nov 13, 2018Updated 7 years ago
- OWASP Foundation Web Respository☆32Oct 11, 2025Updated 4 months ago
- ☆28Nov 25, 2025Updated 3 months ago
- Nmap Web Dashboard and Reporting☆34May 1, 2022Updated 3 years ago
- Windows Forensics Environment Builder☆180Dec 5, 2025Updated 3 months ago
- pollen - A command-line tool for interacting with TheHive☆36Jun 6, 2019Updated 6 years ago
- Notes on managing and coordinating the response to major cyber incidents☆41May 30, 2020Updated 5 years ago
- Rapid Response sample Foundry app☆17Updated this week
- PST Parser using pypff - Export all email headers and body to csv or json☆10Nov 8, 2019Updated 6 years ago
- ☆12Jan 5, 2021Updated 5 years ago
- Emulates the Sysinternals Autoruns tool, but for DFIR purposes e.g. multi user processing☆55May 18, 2019Updated 6 years ago
- ☆48Oct 28, 2022Updated 3 years ago
- This tool aims at parsing Microsoft Protection logs to provide relevant data to forensic analysts during incident responses.☆21Sep 30, 2022Updated 3 years ago
- Deduplication of yara rules☆10Sep 18, 2017Updated 8 years ago
- YARA duplicate rule detection and removal. YARA rule index creation. YARA rule file merger.☆10Jan 19, 2026Updated last month
- Python script for carving Bitlocker VMK keys☆26Feb 4, 2026Updated last month
- Simple Golang JWT Bruteforcer 2☆10May 25, 2021Updated 4 years ago
- Point of Concept: To help to automate the collection of evidence for SOC 2 Audits and etc.☆11May 13, 2024Updated last year
- Python framework to solve crypto problems using grainofsalt and cryptominisat☆14May 24, 2022Updated 3 years ago
- Tool to extract indicators of compromise from security reports in PDF,HTML,Web,Text format☆10Nov 6, 2017Updated 8 years ago
- A concise, directive, specific, flexible, and free incident response plan template☆759May 7, 2024Updated last year
- Free incident cyber response plan template☆49Aug 19, 2025Updated 6 months ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆51Apr 25, 2024Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆13Mar 25, 2023Updated 2 years ago
- CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling Inspired by the OODA Loop☆15Dec 11, 2024Updated last year
- A script that parses nmap.xml output, identifies all SSL services and automatically performs an sslscan of each service☆14Jul 2, 2025Updated 8 months ago
- A Windows PowerShell & PowerShell Core Module to calculate a CVSS3 Score based on a Vector string☆12Dec 20, 2022Updated 3 years ago
- The intake formats supported by SEKOIA.IO☆18Updated this week
- CrowdStrike Falcon log forwarder from falcon S3 bucket to your S3 bucket☆11Apr 15, 2021Updated 4 years ago
- Random PowerShell Work☆11Dec 3, 2025Updated 3 months ago
- A GitHub action that organizes your post-mortems☆17Oct 12, 2022Updated 3 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆46Jan 2, 2022Updated 4 years ago
- 🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.☆12Jan 11, 2020Updated 6 years ago
- ☆11Aug 11, 2014Updated 11 years ago
- Hunt the windows Registry automatically using VQL☆14Jan 6, 2026Updated last month