vm32 / Linux-Incident-Response
practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response
☆393Updated last year
Alternatives and similar repositories for Linux-Incident-Response:
Users that are interested in Linux-Incident-Response are comparing it to the libraries listed below
- Playbooks for SOC Analysts☆423Updated 2 years ago
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆646Updated last month
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated 10 months ago
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆183Updated 8 months ago
- ☆169Updated last year
- Map tracking ransomware, by OCD World Watch team☆453Updated last week
- Awesome list of keywords and artifacts for Threat Hunting sessions☆545Updated last week
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆593Updated 2 weeks ago
- CLI tools for forensic investigation of Windows artifacts☆326Updated 4 months ago
- Practical Windows Forensics Training☆647Updated last year
- A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as …☆390Updated 2 months ago
- Awesome Security lists for SOC/CERT/CTI☆873Updated this week
- Awesome Incident Response☆267Updated 11 months ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆229Updated last year
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Updated 4 months ago
- MISP Playbooks☆186Updated last month
- Halberd : Multi-Cloud Attack Platform☆250Updated last week
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆348Updated last month
- Advanced Bash script designed for conducting digital forensics on Linux systems☆139Updated 11 months ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆193Updated 8 months ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆270Updated last year
- This is a collection of threat detection rules / rules engines that I have come across.☆283Updated 10 months ago
- A resource containing all the tools each ransomware gangs uses☆975Updated 2 weeks ago
- ☆236Updated last month
- Unlock the power of Splunk SIEM for comprehensive log analysis. Collaborate and innovate with our Splunk Log Analysis Projects on GitHub☆114Updated 8 months ago
- A curated list of Awesome Threat Intelligence Blogs☆380Updated last month
- A repository of KQL queries focused on threat hunting and threat detecting for Microsoft Sentinel & Microsoft XDR (Former Microsoft 365 D…☆666Updated last month
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆144Updated last year