nobody-cares / Incident-Response-PlanLinks
Incident Response Plan for all major incidents including cheatsheets for both linux and windows
☆14Updated 5 years ago
Alternatives and similar repositories for Incident-Response-Plan
Users that are interested in Incident-Response-Plan are comparing it to the libraries listed below
Sorting:
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆27Updated 4 years ago
- Sharing Threat Hunting runbooks☆26Updated 5 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆44Updated last year
- Notes on managing and coordinating the response to major cyber incidents☆40Updated 5 years ago
- Incident Response Playbooks☆14Updated 6 years ago
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆39Updated 3 years ago
- Tool used to perform threat intelligence against packet data☆35Updated 4 months ago
- Incident Response Report Using GitHub-Sphinx☆20Updated 5 years ago
- SIEM Detection Use Case Library mapped to MITRE ATT&CK tactics and techniques☆12Updated 6 years ago
- Incident Response Network Tools☆24Updated 3 years ago
- ☆21Updated 3 years ago
- Repository for SPEED SIEM Use Case Framework☆55Updated 5 years ago
- Expert Investigation Guides☆51Updated 4 years ago
- Synapse: a Meta Alert Feeder for TheHive, a Security Incident Response Platform☆71Updated last year
- TheHiveIRPlaybook is a collection of TheHive case templates used for Incident Response☆13Updated 4 years ago
- Best practices in threat intelligence☆47Updated 2 years ago
- Cheat sheets for threat hunting, detection and other stuff.☆34Updated 2 years ago
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆44Updated 4 years ago
- ☆29Updated 4 years ago
- Reference sheet for Threat Hunting Professional Course☆25Updated 6 years ago
- FIles and guides related to using Elasticstack as a SIEM☆12Updated 5 years ago
- ☆16Updated 4 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- ☆39Updated 4 years ago
- Cybersecurity Incident Response Plan☆91Updated 4 years ago
- Convert Sigma rules to LogRhythm searches☆21Updated 3 years ago
- Wrap any binary into a cached webserver☆53Updated 3 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆59Updated 3 weeks ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆53Updated 2 years ago
- Using QRadar API☆20Updated 7 years ago