intelligence-driven-incident-response / intelligence-product-templates
Chapter 9: Disseminate
☆14Updated 7 years ago
Alternatives and similar repositories for intelligence-product-templates:
Users that are interested in intelligence-product-templates are comparing it to the libraries listed below
- Library of threat hunts to get any user started!☆44Updated 4 years ago
- CSIRT Jump Bag☆26Updated last year
- Open source training materials for law-enforcement and organisations interested in DFIR.☆55Updated 3 months ago
- Logbook for Digital Forensics and Incident Response☆50Updated 9 months ago
- A community event for security researchers to share their favorite notebooks☆107Updated last year
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆63Updated 2 years ago
- ☆34Updated 6 months ago
- Scripts and lists to help generate YARA friendly string mutations☆21Updated 2 years ago
- MITRE Shield website☆19Updated 3 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- Site for IWS book content☆18Updated 6 years ago
- TheHiveIRPlaybook is a collection of TheHive case templates used for Incident Response☆13Updated 4 years ago
- Notes from my "Implementing a Kick-Butt Training Program: Blue Team GO!" talk☆12Updated 6 years ago
- Python library for threat intelligence☆86Updated 3 months ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆51Updated 2 years ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆53Updated 2 years ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆26Updated this week
- Cyber Threats Detection Rules☆14Updated 3 months ago
- Open-source Fabric templates for cybersecurity and compliance☆17Updated 3 months ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆38Updated last year
- A completely unsupported set of scripts used in SANS FOR572, Advanced Network Forensics and Analysis☆26Updated 4 months ago
- ☆19Updated 2 years ago
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆42Updated 2 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- A MITRE ATT&CK Lookup Tool☆45Updated last year
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆35Updated 2 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆28Updated this week
- ☆28Updated 3 months ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆67Updated last week
- DNS Dashboard for hunting and identifying beaconing☆15Updated 4 years ago