infosystir / ReverseKillChainLinks
Kill Chain Matrix -->>
☆38Updated 6 years ago
Alternatives and similar repositories for ReverseKillChain
Users that are interested in ReverseKillChain are comparing it to the libraries listed below
Sorting:
- SEC599 supporting GitHub repository☆16Updated 6 years ago
- Splunk Boss of the SOC v1 data set.☆113Updated 7 years ago
- ☆73Updated 7 years ago
- ☆50Updated 5 years ago
- Philly Security Shell meetup demo and related files☆31Updated 6 years ago
- To parse ugly Microsoft DNS Logs....☆41Updated 7 years ago
- Term concordances for each course in the SANS DFIR curriculum. Used for automated index generation.☆68Updated 5 years ago
- The gse-study repo was assembled to serve as a consolidated, and comprehensive, study solution for the SANS GSE exam.☆24Updated 7 years ago
- A Splunk app with saved reports derived from Sigma rules☆73Updated 7 years ago
- This repository is created to add value to existing Network Security Monitoring solutions.☆43Updated 9 years ago
- ☆55Updated 3 years ago
- Slides and Other Resources from my latest Talks and Presentations☆24Updated 3 months ago
- ☆194Updated last year
- CrowdStrike Falcon Orchestrator provides automated workflow and response capabilities☆189Updated last year
- Handy scripts developed and discussed on http://auditcasts.com☆19Updated 6 years ago
- Integrating Sysinternals Autoruns’ logs into Security Onion☆31Updated last year
- automate your MISP installs☆68Updated 5 years ago
- ☆36Updated 9 years ago
- Resources and materials for DEF CON 2018 Packet Hunting Workshop☆79Updated 7 years ago
- Office365 Log Analysis Framework☆81Updated 6 years ago
- Evolving directions on building the best Open Source Forensics VM☆161Updated 7 years ago
- Expert Investigation Guides☆51Updated 4 years ago
- Primary data pipelines for intrusion detection, security analytics and threat hunting☆85Updated 3 years ago
- PowerShell No Agent Hunting☆110Updated 7 years ago
- Learn you a book for some infosec good☆62Updated 6 years ago
- All the IOC's I have gathered which are used directly involved coronavirus / covid-19 / SARS-CoV-2 cyber attack campaigns☆65Updated 4 years ago
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Updated 7 years ago
- CB API scripts for IR, administration, etc.☆32Updated 6 years ago
- Resolvn Threat Hunting Virtual Machine☆139Updated 6 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆107Updated 5 years ago