guardsight / gsvsoc_mission-modelLinks
Incident Response Report Using GitHub-Sphinx
☆20Updated 5 years ago
Alternatives and similar repositories for gsvsoc_mission-model
Users that are interested in gsvsoc_mission-model are comparing it to the libraries listed below
Sorting:
- Cybersecurity Incident Response Plan☆91Updated 4 years ago
- ☆28Updated 4 months ago
- Repository for SPEED SIEM Use Case Framework☆56Updated 5 years ago
- A script that updates KAPE (using Get-KAPEUpdate.ps1) as well as EZ Tools (within .\KAPE\Modules\bin) and the ancillary files that enhanc…☆57Updated last month
- A dataset containing Office 365 Unified Audit Logs for security research and detection☆52Updated 3 years ago
- ☆45Updated 2 years ago
- ☆73Updated 9 months ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Updated 3 years ago
- A PowerShell incident response script for quick triage☆80Updated 3 years ago
- BulkStrike enables the usage of CrowdStrike Real Time Response (RTR) to bulk execute commands on multiple machines.☆42Updated 2 years ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆115Updated last year
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆37Updated 3 years ago
- ☆17Updated 2 years ago
- ☆63Updated 2 years ago
- ☆26Updated 3 years ago
- A preconfigured Velociraptor triage collector☆52Updated last week
- User Feedback Space of #MitreAssistant☆37Updated 2 years ago
- ☆35Updated 9 months ago
- ☆8Updated 9 months ago
- PowerShell scripts for running Magnet RESPONSE forensic collection tool in large enterprises.☆26Updated 6 months ago
- Parses KAPE module files and downloads binaries referenced by BinaryURL☆18Updated 5 years ago
- ☆33Updated 3 years ago
- Notes on managing and coordinating the response to major cyber incidents☆41Updated 5 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆45Updated 3 years ago
- ☆42Updated 2 years ago
- Cheat sheets for threat hunting, detection and other stuff.☆34Updated 2 years ago
- A collection of tips for using MISP.☆74Updated 7 months ago
- Tool to extract Sessions, MessageID(s) and find the emails belonging to MessageID(s). This script utilizes the MailItemsAccessed features…☆41Updated 4 years ago
- Jupyter notebooks for threat hunting☆58Updated 4 months ago
- A repo for centralizing ongoing research on the new Windows 10/11 DFIR artifact, EventTranscript.db.☆41Updated 3 years ago