nobody-cares / Incident-Response-PlanView external linksLinks
Incident Response Plan for all major incidents including cheatsheets for both linux and windows
☆14Jun 4, 2020Updated 5 years ago
Alternatives and similar repositories for Incident-Response-Plan
Users that are interested in Incident-Response-Plan are comparing it to the libraries listed below
Sorting:
- Push-button Security Operations Center using Kubernetes☆13Oct 19, 2016Updated 9 years ago
- TheHiveIRPlaybook is a collection of TheHive case templates used for Incident Response☆13Jul 13, 2020Updated 5 years ago
- ☆18Mar 24, 2025Updated 10 months ago
- A repository of output using KAPE (!EZParser Module) for various publicly available forensic images!☆17Aug 31, 2024Updated last year
- List of scripts used for malware analysis☆15Aug 10, 2015Updated 10 years ago
- Materials for a course based on the Practical Malware Analysis text by Andrew Honig and Michael Sikorski☆19Jan 4, 2019Updated 7 years ago
- OpenCL Digital Forensics data analysis and file carving tool☆24May 14, 2023Updated 2 years ago
- WebAMS is an Open Source web application for reporting and resolving incidents or tickets☆10Dec 11, 2022Updated 3 years ago
- Decrypt NTDS hashes☆23Jan 22, 2014Updated 12 years ago
- Malware Analysis tools☆26Sep 14, 2024Updated last year
- Scripts, SQL queries, and other resources for Nexpose☆30Mar 3, 2025Updated 11 months ago
- 🕵️♀️ Find, locate, and query files for ops and security experts ⚡️⚡️⚡️☆37Dec 18, 2022Updated 3 years ago
- Windows 10 Live Information viewer☆37Jan 27, 2022Updated 4 years ago
- Reverse Engineering and Malware Analysis - Books, Tools, Courses, etc.☆44Apr 5, 2017Updated 8 years ago
- Notes on managing and coordinating the response to major cyber incidents☆41May 30, 2020Updated 5 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- MFT Fast Transcoder is a fast forensic tool to analyze MFT of NTFS partitions.☆12Feb 27, 2023Updated 2 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- Powershell to read ETL file on an interval and convert it to an EVTX (so Windows Event Forwarding can 'subscribe')☆11May 16, 2017Updated 8 years ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- OSINT=*, Chrome extension that searches all the threat feeds☆11Dec 5, 2021Updated 4 years ago
- Cybersecurity Incident Response Plan☆109Oct 2, 2020Updated 5 years ago
- Windows privileges add to the complexity of Windows user permissions. Each additional user added to a group could lead to a domain compro…☆10Mar 2, 2018Updated 7 years ago
- Looking for React.js jobs? Here are the most popular React Interview Questions and Answers which are most likely to be asked by the inter…☆10Jul 18, 2020Updated 5 years ago
- ☆12Feb 9, 2025Updated last year
- This repository provide a json file for all Windows security Event IDs with lot of useful informations (Categories, GPO, Volume, Recomman…☆11Mar 2, 2023Updated 2 years ago
- Angular Personal Resume And Portfolio Template☆10Jan 29, 2026Updated 2 weeks ago
- Gets currently logged-on users on domain computers, to see if they are local admins or not.☆10Aug 14, 2019Updated 6 years ago
- EvtXHunt is an Autopsy plugin that is able to analyze Windows EVTX logs against a library of SIGMA rules.☆15Nov 7, 2021Updated 4 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Jul 16, 2020Updated 5 years ago
- Cyber | Cloud Security Checklist | Incident Response | Policy Template | Use cases☆13Nov 24, 2020Updated 5 years ago
- Stalk whoever you want on Github☆13Feb 7, 2020Updated 6 years ago
- Malware Analysis and Storage System - Server repository☆12Jul 15, 2022Updated 3 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 4 years ago
- Source files found after a recent hack of one of my machines, showing how the infection spreads itself and what it does, useful for analy…☆13May 4, 2020Updated 5 years ago
- Disk Image Mounting Script☆11Jan 22, 2026Updated 3 weeks ago
- Custom Queries, Dashboards, and HIPs Rules☆10Jan 13, 2018Updated 8 years ago
- Digital Forensics and Incident Response notes and Autopsy tool walkthrough☆11Feb 3, 2022Updated 4 years ago