veeral-patel / true-positiveLinks
Collaborative, web-based case management for incident response
☆23Updated last year
Alternatives and similar repositories for true-positive
Users that are interested in true-positive are comparing it to the libraries listed below
Sorting:
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆90Updated last week
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆46Updated last year
- Workflows for Shuffle☆23Updated 2 years ago
- A collection of tips for using MISP.☆74Updated 8 months ago
- Incident Response Network Tools☆24Updated 4 years ago
- The official Prelude SIEM GitHub of https://www.prelude-siem.org☆33Updated 9 years ago
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆40Updated 3 years ago
- An open source platform to support analysts to organise their case and tasks☆103Updated this week
- Import specific data sources into the Sigma generic and open signature format.☆78Updated 3 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Updated 3 years ago
- Table Top Exercise (TTX) for Computer Security Incident Response (CSIRT) teams. The templatized artifacts provided will hopefully help te…☆39Updated 5 years ago
- ☆29Updated 4 years ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆112Updated 2 years ago
- simple webapp for converting sigma rules into siem queries using the pySigma library☆51Updated 2 years ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆16Updated 3 years ago
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆34Updated 3 years ago
- The aim of this repository is to provide a list of examples of tools, sources and measures available to incident response teams☆62Updated 5 years ago
- Swagger/ OpenAPI specifications for security products and services☆78Updated 2 weeks ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆45Updated 3 years ago
- ☆86Updated 6 months ago
- Strelka Web UI for File Submission and Analysis☆70Updated 2 weeks ago
- Notes for High Availability MISP in AWS☆19Updated 5 years ago
- Run Velociraptor on Security Onion☆39Updated 3 years ago
- This TA takes Suricata5 data from your port mirrored Suricata server and makes it readable within Splunk. See Cheatsheets on how to setup…☆15Updated 5 years ago
- Sample programs to access the API☆89Updated 4 months ago
- Corelight@Home script☆43Updated last year
- Notes on managing and coordinating the response to major cyber incidents☆41Updated 5 years ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Updated 3 years ago
- Resources, tools and utilities about Threat Intelligence☆73Updated 2 years ago
- OpenCTI–Wazuh connector looking for indicators in Wazuh and creating sightings☆18Updated last year