Cybersecurity Incidents Mind Maps
☆34Sep 29, 2021Updated 4 years ago
Alternatives and similar repositories for IncidentsMindMaps
Users that are interested in IncidentsMindMaps are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- Event metadata collected across all manifest-based ETW providers on Window 10 1903☆32Nov 25, 2019Updated 6 years ago
- Auxiliary scripts for Incident Response with ELK☆11Oct 7, 2015Updated 10 years ago
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- Python library to query various sources of threat intelligence for data on domains, file hashes, and IP addresses.☆31Nov 6, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- ☆18Jul 13, 2022Updated 3 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆63May 30, 2025Updated 11 months ago
- The method and files used to generate Sysmon event logs, push them to a remote Splunk, and ingest/normalize the data for analysis.☆10Sep 28, 2020Updated 5 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated 2 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- Core module for Forgiva Enterprise connecting Forgiva Server to Forgiva Webclient.☆13Mar 28, 2022Updated 4 years ago
- Splunk Technology Add-On (TA) for collecting ETW events from Windows systems☆16Dec 8, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Service Enumeration C# .NET Assembly☆58Sep 14, 2021Updated 4 years ago
- A framework for orchestrating forensic collection, processing and data export☆346Updated this week
- AWS EKS Cluster Forensics☆23Aug 16, 2021Updated 4 years ago
- SysScout is a fully encapsulated script that quickly and easily pulls local machine information from Linux-Based systems. A simple, easy…☆13Oct 20, 2017Updated 8 years ago
- Yara sort☆13Apr 20, 2026Updated last week
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- Utilities for working with vivisect☆26Oct 1, 2025Updated 7 months ago
- attack2jira automates the process of standing up a Jira environment that can be used to track and measure ATT&CK coverage☆115Mar 26, 2023Updated 3 years ago
- ☆53Mar 4, 2019Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Threathunt details for the Solarwinds compromise☆33Jun 26, 2021Updated 4 years ago
- ☆15Sep 26, 2022Updated 3 years ago
- Log Examination Tool☆27Oct 11, 2016Updated 9 years ago
- Various tools and scripts☆43Nov 30, 2022Updated 3 years ago
- Carving tool based in Radare2 & Yara☆16Oct 30, 2018Updated 7 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- A Splunk Technology Add-on to forward filtered ETW events.☆31Oct 14, 2020Updated 5 years ago
- ☆12Jun 3, 2022Updated 3 years ago
- A modern Python-3-based alternative to RegRipper☆213Mar 31, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Azure function to insert MISP data in to Azure Sentinel☆33Oct 19, 2022Updated 3 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Binaries for the log2timeline projects and dependencies☆40Updated this week
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- Example programs used in the automating DFIR series☆63Mar 4, 2019Updated 7 years ago
- Wrapper for TSK (Sleuth Kit) Bindings☆12Jan 10, 2023Updated 3 years ago
- ☆21Nov 19, 2025Updated 5 months ago