magoo / Incident-Response-PlanView external linksLinks
Boilerplate Incident Response Plan from "Starting Up Security"
☆165Nov 2, 2020Updated 5 years ago
Alternatives and similar repositories for Incident-Response-Plan
Users that are interested in Incident-Response-Plan are comparing it to the libraries listed below
Sorting:
- Things to know when DFIR occurs near a vault deployment.☆44May 21, 2018Updated 7 years ago
- Free incident cyber response plan template☆48Aug 19, 2025Updated 5 months ago
- A minimalist risk management program!☆151Aug 10, 2022Updated 3 years ago
- read the docs version of risk management☆27Mar 6, 2023Updated 2 years ago
- Issues to consider when planning a red team exercise.☆614Aug 23, 2017Updated 8 years ago
- Notes and reference for ongoing forecasting.☆16Mar 24, 2022Updated 3 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Feb 1, 2022Updated 4 years ago
- PowerShell Memory Pulling script☆19Mar 24, 2015Updated 10 years ago
- Cybersecurity Incident Response Plan☆109Oct 2, 2020Updated 5 years ago
- Custom Queries, Dashboards, and HIPs Rules☆10Jan 13, 2018Updated 8 years ago
- ☆85Oct 15, 2022Updated 3 years ago
- Checklist intended to be used as a baseline for assessing, designing, and testing the security of a MAM (Application Wrapping) solution☆20Sep 2, 2015Updated 10 years ago
- Distributed password cracker for operating over high latency networks of loosely coupled hosts.☆13Jul 30, 2013Updated 12 years ago
- Collection of information security policies.☆29Apr 20, 2017Updated 8 years ago
- Incident Response Methodologies☆1,018Aug 2, 2018Updated 7 years ago
- Collaborative Open Playbook Standard☆159Dec 29, 2025Updated last month
- AuthTables is a microservice that helps detect "Account Take Over" caused by simple credential theft. If bad actors are stealing your use…☆230Nov 14, 2017Updated 8 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Jul 7, 2018Updated 7 years ago
- Service desk password tools.☆16Apr 21, 2017Updated 8 years ago
- Windows Privesc Check☆20May 20, 2014Updated 11 years ago
- Virtual host brute forcer☆22Jan 10, 2014Updated 12 years ago
- Powershell Threat Hunting Module☆289Sep 21, 2016Updated 9 years ago
- Outlook add-in companion to report suspicious mail easily☆133Sep 1, 2022Updated 3 years ago
- Simple tool to extract the most common substrings from an input text. Built for password cracking.☆65Jun 28, 2020Updated 5 years ago
- ☆14Mar 31, 2018Updated 7 years ago
- Personal repository with handy cheatsheets.☆16Oct 23, 2016Updated 9 years ago
- Hunting Malicious Macros SANS Threathunting Summit 2021 Materials☆39Oct 9, 2021Updated 4 years ago
- Incident Response Plan for all major incidents including cheatsheets for both linux and windows☆14Jun 4, 2020Updated 5 years ago
- Reading List for CSIRT Team Members☆17Oct 21, 2019Updated 6 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Jun 15, 2021Updated 4 years ago
- Expert Investigation Guides☆51Mar 18, 2021Updated 4 years ago
- An alternative for Metasploit psexec module, with automation capabilites to run across multiple hosts, while detecting the correct archit…