pain0x0 / awesome-incident-responseLinks
☆25Updated 2 years ago
Alternatives and similar repositories for awesome-incident-response
Users that are interested in awesome-incident-response are comparing it to the libraries listed below
Sorting:
- BlueBox Malware analysis Box and Cyber threat intelligence.☆43Updated 3 years ago
- Really can protect from ransomware encryption?☆46Updated last year
- Cloudformation Template to Launch the SOC from Kali Purple☆52Updated last year
- ReconPal: Leveraging NLP for Infosec☆56Updated 3 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆99Updated last month
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆62Updated last year
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆115Updated 4 years ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆143Updated 2 years ago
- ☆22Updated 2 years ago
- Some Threat Hunting queries useful for blue teamers☆130Updated 3 years ago
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆20Updated last year
- Script to test NetSec capabilities.☆21Updated 2 years ago
- Memory Forensic System on Cloud☆92Updated last year
- ☆19Updated 4 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆97Updated 2 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆65Updated 3 years ago
- ☆35Updated 11 months ago
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆122Updated 2 years ago
- Virus Total Free - IOC parser and report generator☆23Updated 2 years ago
- ☆52Updated 2 months ago
- Library of threat hunts to get any user started!☆45Updated 5 years ago
- Tool to discover external and internal network attack surface☆203Updated last year
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆22Updated 2 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 3 years ago
- This script is to build Wazuh 4.3 environment☆11Updated 3 years ago
- ☆13Updated 3 years ago
- Slides of my public talks☆56Updated last year
- An experimental Velociraptor implementation using cloud infrastructure☆26Updated 2 weeks ago
- Linux Evidence Acquisition Framework☆118Updated last year