magoo / Incident-Response-Plan
Boilerplate Incident Response Plan from "Starting Up Security"
☆161Updated 4 years ago
Alternatives and similar repositories for Incident-Response-Plan:
Users that are interested in Incident-Response-Plan are comparing it to the libraries listed below
- A Terraform module for GRR: the distributed incident forensics and response framework☆51Updated 4 years ago
- Vendor Security Model Contract☆97Updated 2 years ago
- A collection of static files maintained by the Sublime team, primarily used for phishing defense.☆86Updated this week
- Free incident cyber response plan template☆46Updated 3 years ago
- A set of policies, standards and control procedures with mapping to HIPAA, NIST CSF, PCI DSS, SOC2, FedRAMP, CIS Controls, and more.☆306Updated 7 months ago
- Collection of useful Canary tools☆75Updated this week
- A Slack bot to add security info to messages containing URLs, hashes and IPs☆71Updated 5 months ago
- Threat Feed Aggregation, Made Easy☆167Updated 4 years ago
- ☆77Updated 2 years ago
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆62Updated 4 years ago
- ☆65Updated 8 months ago
- Python installable command line utiltity for mitigation of host and key compromises.☆344Updated 3 years ago
- The SOCless automation framework☆137Updated this week
- Dorothy is a tool to test security monitoring and detection for Okta environments☆178Updated 6 months ago
- ☆30Updated 6 years ago
- Remote Memory Acquisition Tool☆245Updated 4 years ago
- Things to know when DFIR occurs near a vault deployment.☆43Updated 6 years ago
- Recon Hunt Queries☆76Updated 3 years ago
- Multithreaded threat Intelligence gathering built with Python3☆173Updated 7 years ago
- ☆44Updated last year
- Main Build directory☆178Updated 5 years ago
- Serverless, low cost, threat intel aggregation for enterprise or personal use, backed by ElasticSearch.☆140Updated last year
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆137Updated 3 years ago
- Tools to automate and/or expedite response.☆113Updated 7 months ago
- Repository for the Open Information Security Risk Universe☆63Updated 2 years ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆71Updated 3 months ago
- ☆117Updated last year
- Scan domains and return data based on trustworthy email best practices☆199Updated this week
- Various public documents, white-papers, articles, data, analysis, and statistics about breaches and security trends.☆90Updated 5 years ago
- ☆131Updated 10 months ago