magoo / Incident-Response-Plan
Boilerplate Incident Response Plan from "Starting Up Security"
☆162Updated 4 years ago
Alternatives and similar repositories for Incident-Response-Plan:
Users that are interested in Incident-Response-Plan are comparing it to the libraries listed below
- Free incident cyber response plan template☆48Updated 3 years ago
- Vendor Security Model Contract☆99Updated 2 years ago
- Serverless, low cost, threat intel aggregation for enterprise or personal use, backed by ElasticSearch.☆140Updated last year
- Dorothy is a tool to test security monitoring and detection for Okta environments☆179Updated 7 months ago
- Tools to automate and/or expedite response.☆113Updated 8 months ago
- ☆44Updated 2 years ago
- Remote Memory Acquisition Tool☆245Updated 4 years ago
- A collection of static files maintained by the Sublime team, primarily used for phishing defense.☆86Updated last week
- Various public documents, white-papers, articles, data, analysis, and statistics about breaches and security trends.☆92Updated 5 years ago
- Dashboard to collect, analyze, and respond to reported phishing emails.☆288Updated last year
- The SOCless automation framework☆139Updated last month
- Multithreaded threat Intelligence gathering built with Python3☆173Updated 7 years ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆71Updated 5 months ago
- ☆117Updated last year
- Main Build directory☆179Updated 5 years ago
- ☆213Updated last year
- Threat Feed Aggregation, Made Easy☆167Updated 4 years ago
- ☆42Updated 4 years ago
- A Command-line tool which leverages the Tenable.io API to reduce the time it takes to get information that is common during remediation o…☆74Updated 6 months ago
- Collection of useful Canary tools☆76Updated last week
- A community contributed consolidated list of InfoSec meetups in the Asia Pacific region.☆166Updated this week
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆62Updated 4 years ago
- Security Monitoring Resolution Categories☆138Updated 3 years ago
- Python installable command line utiltity for mitigation of host and key compromises.☆344Updated 3 years ago
- ☆65Updated 10 months ago
- A place to gather and organize information about using threat modeling frameworks to deal with social conflict in online systems☆56Updated last year
- Mark Baggett's (@MarkBaggett - GSE #15, SANS SEC573 Author) tool for detecting randomness using NLP techniques rather than pure entropy c…☆125Updated 2 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆73Updated 3 years ago
- Osquery Mangement Server☆113Updated 4 years ago
- ☆32Updated last year