vm32 / Linux-Incident-Response
practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response
☆398Updated last year
Alternatives and similar repositories for Linux-Incident-Response:
Users that are interested in Linux-Incident-Response are comparing it to the libraries listed below
- ☆175Updated last year
- Playbooks for SOC Analysts☆501Updated 2 years ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆662Updated this week
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆672Updated 3 months ago
- Awesome Incident Response☆270Updated last year
- Practical Windows Forensics Training☆663Updated last year
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆245Updated last month
- A collection of companies that disclose adversary TTPs after they have been breached☆243Updated last year
- Map tracking ransomware, by OCD World Watch team☆466Updated 2 months ago
- CLI tools for forensic investigation of Windows artifacts☆327Updated 6 months ago
- Open Source Security Operations Center Documentation☆178Updated last week
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆379Updated 3 months ago
- Advanced Bash script designed for conducting digital forensics on Linux systems☆141Updated last year
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Updated 5 months ago
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆189Updated 10 months ago
- MISP Playbooks☆199Updated 2 months ago
- A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as …☆391Updated 4 months ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆276Updated last year
- Awesome list of keywords and artifacts for Threat Hunting sessions☆566Updated 2 weeks ago
- This is a collection of threat detection rules / rules engines that I have come across.☆287Updated last year
- Digital forensics lab course, as offered in FAST NUCES Karachi during Spring 2023.☆297Updated 2 years ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆196Updated 10 months ago
- Halberd : Multi-Cloud Attack Tool☆272Updated 2 weeks ago
- ☆210Updated 11 months ago
- A repository of KQL queries focused on threat hunting and threat detecting for Microsoft Sentinel & Microsoft XDR (Former Microsoft 365 D…☆681Updated 3 weeks ago
- Awesome Security lists for SOC/CERT/CTI☆954Updated this week
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆244Updated this week
- Cyber Incident Response Team Playbook Battle Cards☆375Updated 11 months ago
- A curated list of Awesome Threat Intelligence Blogs☆390Updated 3 months ago
- Unlock the power of Splunk SIEM for comprehensive log analysis. Collaborate and innovate with our Splunk Log Analysis Projects on GitHub☆131Updated 10 months ago