rnbwkat / presents
Presentations and handouts
☆28Updated last month
Alternatives and similar repositories for presents
Users that are interested in presents are comparing it to the libraries listed below
Sorting:
- Backdoors & Breaches: Campaigns. These are short guides to help Incident Captains by giving them game ideas based on actual breaches.☆35Updated last year
- Web application to create indexes for GIAC certification examinations.☆141Updated 2 years ago
- ☆36Updated last month
- Tools for simulating threats☆183Updated last year
- Create lab environment for Linux Command Line course☆46Updated 7 months ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆114Updated 6 months ago
- InsightVM helpful SQL queries☆64Updated 2 months ago
- Tools to automatically create a SANS index based off the course pdf files.☆100Updated 4 years ago
- Some important DFIR Resources☆83Updated 2 years ago
- Incident Response documents and tooling☆72Updated last year
- ☆59Updated 4 years ago
- Case_Notes.py is a cross-platform (Windows, macOS, & Linux) python script to help make the documentation process easier.☆26Updated last year
- ☆77Updated 3 years ago
- A GeoIP lookup utility utilizing ipinfo.io services.☆87Updated last year
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆122Updated last year
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆111Updated 5 months ago
- Docker Crash Course: How to containerize your favorite security tools☆28Updated last year
- Repository resource for threat hunter☆158Updated 6 years ago
- MacOS forensic acquisition made simple☆134Updated last month
- The latest pyWars client for the SEC573 class☆44Updated 2 months ago
- This repo is meant to be a list of companies that hire security people full remote.☆94Updated 7 months ago
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆77Updated 11 months ago
- Conference presentations☆47Updated last year
- links collected from SOC Core Skills class☆85Updated 4 years ago
- Cyber Underground General Intelligence Requirements☆92Updated last year
- ☆118Updated last year
- ☆46Updated last year
- Cybersecurity Incident Response Plan☆91Updated 4 years ago
- List of past and future infosec related events.☆147Updated this week
- ☆29Updated 4 years ago