sans-blue-team / sec555-wikiView external linksLinks
☆77Jun 25, 2019Updated 6 years ago
Alternatives and similar repositories for sec555-wiki
Users that are interested in sec555-wiki are comparing it to the libraries listed below
Sorting:
- ☆30Nov 15, 2018Updated 7 years ago
- ☆11Jan 5, 2021Updated 5 years ago
- ☆56Jun 12, 2021Updated 4 years ago
- ☆14Feb 8, 2020Updated 6 years ago
- Tools, techniques, cheat sheets, and other resources to assist those defending organizations and detecting adversaries☆458Feb 4, 2022Updated 4 years ago
- SANS Blue Team Pages☆13Apr 8, 2017Updated 8 years ago
- This repository is created to add value to existing Network Security Monitoring solutions.☆17Sep 30, 2016Updated 9 years ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆100Jun 2, 2021Updated 4 years ago
- This repository is created to add value to existing Network Security Monitoring solutions.☆42Sep 20, 2016Updated 9 years ago
- A collaborative CISSP notes card☆39Dec 20, 2015Updated 10 years ago
- ☆39Dec 10, 2020Updated 5 years ago
- ☆227Nov 9, 2023Updated 2 years ago
- Contains Logstash related content including tons of Logstash configurations☆254Aug 25, 2021Updated 4 years ago
- incident response scripts☆18Mar 4, 2019Updated 6 years ago
- ☆51Apr 4, 2020Updated 5 years ago
- ☆50Aug 30, 2020Updated 5 years ago
- ☆34Apr 29, 2021Updated 4 years ago
- Tony's collection of powershell scripts, typically geared toward cybersec☆35Jan 16, 2026Updated last month
- This is a repository for freq.py and freq_server.py☆214Feb 1, 2026Updated 2 weeks ago
- Indices for courses in SANS' Network Security Operations curriculum☆17Feb 5, 2016Updated 10 years ago
- Windows Event Forwarding subscriptions, configuration files and scripts that assist with implementing ACSC's protect publication, Technic…☆227Feb 5, 2025Updated last year
- Find potential Indicators of Compromise among similar Linux servers☆29Oct 28, 2017Updated 8 years ago
- Accompanying PowerShell Modules for DevSec Defense Presentation☆30Apr 15, 2018Updated 7 years ago
- ☆2,383Oct 14, 2023Updated 2 years ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆65Oct 31, 2017Updated 8 years ago
- Investigate suspicious activity by visualizing Sysmon's event log☆431Dec 22, 2023Updated 2 years ago
- Log newly created WMI consumers and processes to the Windows Application event log☆124Feb 28, 2018Updated 7 years ago
- ☆13Oct 7, 2019Updated 6 years ago
- A set of Bash scripts that allows you to repeatably collect and compare baseline audit data from Linux and Windows systems☆20Oct 19, 2013Updated 12 years ago
- "Evolving AppCompat/AmCache data analysis beyond grep"☆209Sep 15, 2021Updated 4 years ago
- Cheat sheets for threat hunting, detection and other stuff.☆34Oct 7, 2022Updated 3 years ago
- Configuration guidance for implementing collection of security relevant Windows Event Log events by using Windows Event Forwarding. #nsac…☆881Nov 17, 2020Updated 5 years ago
- Collection of walkthroughs on various threat hunting techniques☆76Aug 3, 2020Updated 5 years ago
- Documentation of TheHive☆400Sep 20, 2023Updated 2 years ago
- Searches For Threat Hunting and Security Analytics☆238Mar 26, 2025Updated 10 months ago
- Philly Security Shell meetup demo and related files☆31Apr 15, 2019Updated 6 years ago
- My Jupyter Notebooks☆36Mar 14, 2025Updated 11 months ago
- Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.☆937Dec 12, 2023Updated 2 years ago
- Bluewall is a firewall framework designed for offensive and defensive cyber professionals.☆106Apr 7, 2019Updated 6 years ago