msraju / Incident-Response-PlaybooksView external linksLinks
☆47Oct 28, 2022Updated 3 years ago
Alternatives and similar repositories for Incident-Response-Playbooks
Users that are interested in Incident-Response-Playbooks are comparing it to the libraries listed below
Sorting:
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Dec 16, 2021Updated 4 years ago
- ☆44Nov 30, 2022Updated 3 years ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Jan 18, 2023Updated 3 years ago
- Incident Response Playbooks☆15Jun 10, 2019Updated 6 years ago
- ☆34May 24, 2023Updated 2 years ago
- Incident Response Report Using GitHub-Sphinx☆20Oct 28, 2019Updated 6 years ago
- Cyber Incident Response Team Playbook Battle Cards☆426May 10, 2024Updated last year
- petit "playbook" qui pourrait servir de base à une réponse à incident lors d'une attaque de type ransomware☆21Aug 30, 2022Updated 3 years ago
- A curated list of tools for incident response. With repository stars⭐ and forks🍴☆256Feb 10, 2026Updated last week
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆281Mar 20, 2025Updated 10 months ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆45Jan 2, 2022Updated 4 years ago
- A pcap capture analysis helper☆25Aug 30, 2023Updated 2 years ago
- Collaborative, web-based case management for incident response☆24Jan 23, 2024Updated 2 years ago
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆415May 13, 2025Updated 9 months ago
- This repo aims to help you decipher the UAL from a Digital Forensics & Incident Response (DFIR) perspective. The UAL is the Microsoft 365…☆63May 12, 2024Updated last year
- Forensics triage tool relying on Volatility and Foremost☆25Dec 3, 2023Updated 2 years ago
- read the docs version of risk management☆27Mar 6, 2023Updated 2 years ago
- This Repository gives the best and possible strategies against hunting the ransomware☆26Aug 23, 2022Updated 3 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Jan 8, 2024Updated 2 years ago
- ☆102Dec 9, 2025Updated 2 months ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆342Dec 3, 2025Updated 2 months ago
- AWS Security Tool☆29Jan 1, 2024Updated 2 years ago
- ☆193Mar 11, 2024Updated last year
- Browser Reviewer is a portable forensic tool for analyzing user activity in Firefox and Chrome-based browsers. It extracts and displays b…☆55Oct 10, 2025Updated 4 months ago
- A triage data collection script for macOS☆28Nov 27, 2020Updated 5 years ago
- Network sinkhole for isolated malware analysis☆40Mar 5, 2018Updated 7 years ago
- DDTTX Tabletop Trainings☆28Sep 23, 2021Updated 4 years ago
- InvestigationPlaybookSpec☆71Sep 26, 2017Updated 8 years ago
- Data Driven Threat Hunting on the RaspberryPi☆31Jan 26, 2022Updated 4 years ago
- ☆12Updated this week
- Collection of Tools & Techniques for analyzing URLs☆33Oct 1, 2023Updated 2 years ago
- pocket guide for core detection engineering concepts☆31May 8, 2023Updated 2 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆207Jul 21, 2022Updated 3 years ago
- Security Descriptor Definition Language (SDDL) Parser☆38Sep 24, 2025Updated 4 months ago
- My Jupyter Notebooks☆36Mar 14, 2025Updated 11 months ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Mar 1, 2023Updated 2 years ago
- Get-MiniTimeline - Triage Collection and Timeline Generation w/ KAPE☆32May 25, 2024Updated last year
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆757Jan 28, 2025Updated last year
- WA Cyber Security Unit (DGOV Technical) site☆44Updated this week