redar0n / incident-runbook
A runbook for handling security incidents in cooperation with 0xsyr0
☆51Updated 2 years ago
Alternatives and similar repositories for incident-runbook:
Users that are interested in incident-runbook are comparing it to the libraries listed below
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆61Updated 9 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated last year
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆123Updated last year
- Cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for them☆28Updated last year
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆73Updated 2 weeks ago
- Track C2 servers, tools, and botnets over time by framework and location☆39Updated 3 months ago
- Completely Risky Active-Directory Simulation Hub☆99Updated last year
- Scripts and piece of codes used for Active Directory configuration☆84Updated 2 years ago
- ☆55Updated 11 months ago
- Labs & Code snippets for RRT on TTI☆40Updated 2 years ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆101Updated last year
- BlueBox Malware analysis Box and Cyber threat intelligence.☆42Updated 3 years ago
- Linux Baseline and Forensic Triage Tool - BETA☆55Updated 2 years ago
- Powershell tools used for Red Team / Pentesting.☆76Updated last year
- ☆74Updated last month
- A Azure Exploitation Toolkit for Red Team & Pentesters☆165Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 5 months ago
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆54Updated 6 months ago
- ☆41Updated 2 years ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆120Updated last year
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆150Updated 2 years ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆88Updated 6 months ago
- ☆160Updated last year
- CarbonBlack EDR detection rules and response actions☆71Updated 7 months ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆155Updated last month
- MayorSec DNS Enumeration Tool☆86Updated 5 months ago
- Cloudformation Template to Launch the SOC from Kali Purple☆51Updated last year
- Regular Expressions List used in Digital Forensic Tasks☆85Updated 2 months ago
- Audit tool for Active Directory. Automates a lot of checks from a pentester perspective.☆164Updated 7 months ago
- Useful resources about phishing email analysis☆83Updated 3 months ago