YAFRAYAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
Stars: ✭ 22 (-84.51%)
Mutual labels: incident-response, cybersecurity, cyber-threats
WatcherWatcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.
Stars: ✭ 324 (+128.17%)
Mutual labels: incident-response, cybersecurity
Ir RescueA Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
Stars: ✭ 311 (+119.01%)
Mutual labels: incident-response, cybersecurity
GDPatrolA Lambda-powered Security Orchestration framework for AWS GuardDuty
Stars: ✭ 50 (-64.79%)
Mutual labels: incident-response, cybersecurity
Zeek-Network-Security-MonitorA Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
Stars: ✭ 38 (-73.24%)
Mutual labels: cybersecurity, cyber-security-team
RdpCacheStitcherRdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.
Stars: ✭ 176 (+23.94%)
Mutual labels: incident-response, cybersecurity
OpcdeOPCDE Cybersecurity Conference Materials
Stars: ✭ 538 (+278.87%)
Mutual labels: incident-response, cybersecurity
incident-response-plan-templateA concise, directive, specific, flexible, and free incident response plan template
Stars: ✭ 288 (+102.82%)
Mutual labels: incident-response, cybersecurity
NIST-to-TechAn open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (-57.04%)
Mutual labels: cybersecurity, cyber-security-team
Ioc ExplorerExplore Indicators of Compromise Automatically
Stars: ✭ 73 (-48.59%)
Mutual labels: incident-response, cybersecurity
Awesome Incident ResponseA curated list of tools for incident response
Stars: ✭ 4,753 (+3247.18%)
Mutual labels: incident-response, cybersecurity
who and what to followWho and what to follow in the world of cyber security
Stars: ✭ 124 (-12.68%)
Mutual labels: incident-response, cybersecurity
IntelmqIntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.
Stars: ✭ 611 (+330.28%)
Mutual labels: incident-response, cybersecurity
ThePhishThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+376.06%)
Mutual labels: incident-response, cybersecurity
Azure-Sentinel-4-SecOpsMicrosoft Sentinel SOC Operations
Stars: ✭ 140 (-1.41%)
Mutual labels: incident-response, secops
MemProcFS-AnalyzerMemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR
Stars: ✭ 89 (-37.32%)
Mutual labels: incident-response
BTPS-SecPackThis repository contains a collection of PowerShell tools that can be utilized to protect and defend an environment based on the recommendations of multiple cyber security researchers at Microsoft. These tools were created with a small to medium size enterprise environment in mind as smaller organizations do not always have the type of funding a…
Stars: ✭ 33 (-76.76%)
Mutual labels: cybersecurity
AttackSurfaceManagementDiscover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (-68.31%)
Mutual labels: cybersecurity
argusArgus Advanced Remote & Local Keylogger For macOS and Windows
Stars: ✭ 87 (-38.73%)
Mutual labels: cybersecurity