sans-blue-team / CISSP-Notes-CardLinks
A collaborative CISSP notes card
☆39Updated 10 years ago
Alternatives and similar repositories for CISSP-Notes-Card
Users that are interested in CISSP-Notes-Card are comparing it to the libraries listed below
Sorting:
- ☆55Updated 4 years ago
- This repository is created to add value to existing Network Security Monitoring solutions.☆42Updated 9 years ago
- Expert Investigation Guides☆51Updated 4 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 5 years ago
- ☆77Updated 6 years ago
- Presentation Slides and Video links☆32Updated 4 years ago
- Security Monitoring Resolution Categories☆138Updated 4 years ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆65Updated 8 years ago
- Term concordances for each course in the SANS DFIR curriculum. Used for automated index generation.☆68Updated 5 years ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆55Updated 3 years ago
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.☆251Updated 4 years ago
- All the IOC's I have gathered which are used directly involved coronavirus / covid-19 / SARS-CoV-2 cyber attack campaigns☆65Updated 4 years ago
- ☆134Updated last year
- Collection of walkthroughs on various threat hunting techniques☆76Updated 5 years ago
- Sharing Threat Hunting runbooks☆25Updated 6 years ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆57Updated 6 years ago
- Download a list of suspected malicious IPs and Domains. Create a QRadar Reference Set. Search Your Environment For Malicious IPs☆69Updated 4 years ago
- ☆55Updated 3 years ago
- This was code for analyzing round 1 of the MITRE Enterprise ATT&CK Evaluation. Please check out https://github.com/joshzelonis/Enterprise…☆94Updated 5 years ago
- Assimilate is a series of scripts for using the Naïve Bayes algorithm to find potential malicious activity in HTTP headers☆92Updated 8 years ago
- Tools for the Computer Incident Response Team☆149Updated 8 years ago
- Evolving directions on building the best Open Source Forensics VM☆161Updated 7 years ago
- Learn you a book for some infosec good☆62Updated 6 years ago
- All-in-one bundle of MISP, TheHive and Cortex☆169Updated 3 years ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆76Updated 5 years ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Updated 3 years ago
- ☆30Updated 7 years ago
- Salt States for Configuring the SIFT Workstation☆106Updated 3 weeks ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆111Updated 5 years ago
- ☆94Updated last week