teamdfir / sift-packer-legacy
Packer.io Scripts to build the SIFT VM(s)
☆11Updated 4 years ago
Alternatives and similar repositories for sift-packer-legacy:
Users that are interested in sift-packer-legacy are comparing it to the libraries listed below
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 6 years ago
- Build Automated Machine Images for MISP☆28Updated last year
- Dockerfiles for containerized osquery☆13Updated 7 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 5 months ago
- OpenDXL Console is a high-level web-based console for interacting with a DXL fabric☆11Updated 4 years ago
- Scripts used to create ISO installers of ROCK for offline installation.☆10Updated 2 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆53Updated last week
- Repository for lab materials for the Advanced Cloud Security and Applied DevSecOps training class.☆11Updated 5 years ago
- OSCAL SSP content for technologies shipped by Red Hat☆15Updated 2 years ago
- ☆33Updated 2 years ago
- S3Insights is a platform for efficiently deriving security insights about S3 data through metadata analysis☆12Updated 3 weeks ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 4 years ago
- Docker files for Security Onion☆40Updated 4 years ago
- ☆15Updated 5 years ago
- Tachikoma is a security alerting framework for human beings☆22Updated 6 years ago
- Pre-configured environment that supports the development and running of OpenDXL solutions☆13Updated 4 years ago
- Corelight-Ansible-Roles are a collection of Ansible Roles and playbooks that install, configure, run and manage a variety of Corelight, S…☆16Updated 3 years ago
- A python script to shift the timestamp on syslog data. Useful for forensicators combating time skew.☆20Updated 2 years ago
- Looks for GitHub org users without 2FA turned on☆9Updated 8 years ago
- Contains log samples and configuration files for the Tactical Data Handling at Scale with Logstash course☆11Updated 5 years ago
- A set of tools and procedures for automating NSM and NIDS deployments in AWS☆16Updated 4 years ago
- Following repository contains source codes used in my two Books.☆11Updated 9 years ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- This repository is created to add value to existing Network Security Monitoring solutions.☆17Updated 8 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- Example Suricata rules implementing some of my detection tactics☆20Updated 2 years ago
- Tools to make CI Packer builds awesome☆23Updated 9 months ago
- Push "BAD" IPs/Networks into QRadar's "Remote Networks", tag them properly, and use them!☆18Updated 11 years ago
- Presentation Slides and Video links☆32Updated 3 years ago
- DEPRECATED: A set of utilities for converting and working with compliance data for viewing in the heimdall applications☆35Updated 3 years ago