yuriskinfo / awesome-Fortinet
Curated list of useful resources for those working with Fortinet products
☆12Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for awesome-Fortinet
- ☆42Updated last year
- A list of Splunk queries that I've collected and used over time.☆72Updated 4 years ago
- This repository is a comprehensive collection of resources, documentation, apps, and add-ons related to Splunk, a powerful data analytics…☆21Updated this week
- ☆54Updated 3 years ago
- PowerShell Script for AD Security Assessment☆15Updated last year
- ☆24Updated last year
- A list of resources to build a information security team.☆13Updated 3 years ago
- InsightVM helpful SQL queries☆58Updated 5 months ago
- My eBook with tips on how to get started in industrial (ICS/OT) cyber security.☆37Updated last year
- Playbooks for SOC Analysts☆143Updated last year
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆24Updated last month
- ☆47Updated last year
- Tools for simulating threats☆174Updated last year
- SIEM Cheat Sheet☆72Updated last year
- A powerful home-lab focused on setting up Splunk SIEM and real-world use cases. If you’re interested to become SOC Analyst(Tier 1/2) , th…☆41Updated 7 months ago
- Windows Malware Investigation Scripts & Docs☆75Updated this week
- This is a sample script how to parse the Talos blogs, and automatically add observables to Cisco Casebook.☆18Updated last year
- Protect your data in minutes !☆110Updated last week
- ☆12Updated last year
- Some of the tools we use during vCISO engagements☆14Updated 2 years ago
- ☆31Updated 2 years ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆122Updated last week
- These are open source rules that can be utilized with QRadar to detect various types of threats in the environment.☆51Updated 5 years ago
- ☆195Updated 6 months ago
- A collection of various SIEM rules relating to malware family groups.☆61Updated 4 months ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆157Updated this week
- A Windows CIS benchmark policy compliance auditor☆34Updated 6 months ago
- Tools and Techniques for Blue Team / Incident Response☆22Updated last year
- ☆65Updated last year
- ThreatSeeker: Threat Hunting via Windows Event Logs☆114Updated last year