infosystir / ReverseKillChainLinks
Kill Chain Matrix -->>
☆38Updated 6 years ago
Alternatives and similar repositories for ReverseKillChain
Users that are interested in ReverseKillChain are comparing it to the libraries listed below
Sorting:
- SEC599 supporting GitHub repository☆16Updated 6 years ago
- ☆50Updated 5 years ago
- Slides and Other Resources from my latest Talks and Presentations☆24Updated 2 months ago
- Philly Security Shell meetup demo and related files☆31Updated 6 years ago
- Handy scripts developed and discussed on http://auditcasts.com☆19Updated 6 years ago
- The gse-study repo was assembled to serve as a consolidated, and comprehensive, study solution for the SANS GSE exam.☆25Updated 7 years ago
- ☆36Updated 9 years ago
- Term concordances for each course in the SANS DFIR curriculum. Used for automated index generation.☆67Updated 5 years ago
- ☆194Updated last year
- To parse ugly Microsoft DNS Logs....☆41Updated 7 years ago
- Splunk Boss of the SOC v1 data set.☆112Updated 7 years ago
- ☆73Updated 7 years ago
- CrowdStrike Falcon Orchestrator provides automated workflow and response capabilities☆187Updated last year
- This repository is created to add value to existing Network Security Monitoring solutions.☆43Updated 9 years ago
- ☆55Updated 3 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- Check_ioc is a script to check for various, selectable indicators of compromise on Windows systems via PowerShell and Event Logs. It was …☆80Updated 7 years ago
- Expert Investigation Guides☆51Updated 4 years ago
- PowerShell No Agent Hunting☆109Updated 7 years ago
- Build your own threat hunting maturity model☆11Updated 8 years ago
- Integrating Sysinternals Autoruns’ logs into Security Onion☆31Updated last year
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Updated 7 years ago
- Primary data pipelines for intrusion detection, security analytics and threat hunting☆86Updated 3 years ago
- Sysmon configuration file template with default high-quality event tracing☆17Updated 4 years ago
- Splunk app for Threat hunting☆15Updated 7 years ago
- Tools to automate and/or expedite response.☆115Updated last year
- Office365 Log Analysis Framework☆81Updated 6 years ago
- Lists of sources and utilities utilized to hunt, detect and prevent evildoers.☆166Updated 6 years ago
- Main Build directory☆179Updated 6 years ago
- Evolving directions on building the best Open Source Forensics VM☆161Updated 7 years ago