wagov / wasocshared
WA Cyber Security Unit (DGOV Technical) site
☆33Updated this week
Alternatives and similar repositories for wasocshared:
Users that are interested in wasocshared are comparing it to the libraries listed below
- ☆83Updated this week
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 4 months ago
- Dettectinator - The Python library to your DeTT&CT YAML files.☆108Updated last month
- MISP to Sentinel integration☆63Updated 3 months ago
- ☆81Updated last week
- A collection of various SIEM rules relating to malware family groups.☆65Updated 8 months ago
- ☆93Updated 2 years ago
- ☆35Updated 2 months ago
- ☆72Updated 4 months ago
- Cybersecurity Incident Response Plan☆89Updated 4 years ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆23Updated 3 years ago
- ☆42Updated 2 years ago
- A collection of tips for using MISP.☆74Updated 3 months ago
- Tool to extract Sessions, MessageID(s) and find the emails belonging to MessageID(s). This script utilizes the MailItemsAccessed features…☆39Updated 4 years ago
- SentinelOne STAR Rules☆57Updated last month
- ☆41Updated last year
- Cyber Defence related kusto queries for use in Azure Sentinel and Defender advanced hunting☆63Updated this week
- Advanced Hunting Queries for Microsoft Security Products☆106Updated 2 years ago
- This code snippet retrieves Azure Sentinel rules that are mapped to MITRE ATT&CK Framework and generates the related MITRE D3FEND defense…☆71Updated 3 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆39Updated 10 months ago
- A dataset containing Office 365 Unified Audit Logs for security research and detection☆51Updated 2 years ago
- Repository of SentinelOne Deep Visibility queries.☆122Updated 3 years ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆35Updated 3 weeks ago
- Notes on managing and coordinating the response to major cyber incidents☆40Updated 4 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆121Updated 4 years ago
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs☆52Updated last year
- ☆85Updated 3 weeks ago
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆158Updated last week
- Microsoft 365 Advanced Hunting Queries with hotlinks that plug the query right into your tenant.☆119Updated 7 months ago
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆76Updated 9 months ago