utilsec / QuickStart-GuidesLinks
☆46Updated last year
Alternatives and similar repositories for QuickStart-Guides
Users that are interested in QuickStart-Guides are comparing it to the libraries listed below
Sorting:
- ☆59Updated last year
- My eBook with tips on how to get started in industrial (ICS/OT) cyber security.☆51Updated last year
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆87Updated last year
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆127Updated last year
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆78Updated 2 months ago
- Some important DFIR Resources☆83Updated 2 years ago
- Security Scripts and Sources for daily usage.☆60Updated 3 weeks ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆253Updated 2 months ago
- ☆177Updated last year
- ☆59Updated 4 years ago
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆78Updated 3 years ago
- ☆48Updated last week
- Tools for simulating threats☆185Updated last year
- AD Lab Setup Scripts☆73Updated 3 weeks ago
- Generate a matrix based on an inventory of InfoSec tools☆23Updated 11 months ago
- ☆15Updated last year
- A list of Splunk queries that I've collected and used over time.☆83Updated 4 years ago
- SIEM Cheat Sheet☆73Updated last year
- A collection of various SIEM rules relating to malware family groups.☆66Updated 11 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆91Updated 7 months ago
- Windows Malware Investigation Scripts & Docs☆83Updated 6 months ago
- NIST CSF Maturity Toolkit☆40Updated 3 months ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆196Updated 11 months ago
- ☆9Updated 11 months ago
- ☆33Updated 6 months ago
- A collection of companies that disclose adversary TTPs after they have been breached☆243Updated last year
- ☆44Updated 2 years ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆112Updated 6 months ago
- A self assessment tool to help understand your level in the SANS Vulnerability Management Maturity Model (VMMM).☆39Updated 3 months ago
- Automating Security Detection Engineering, published by Packt☆54Updated 7 months ago