Actionable analytics designed to combat threats
-
Updated
May 25, 2022 - Python
Actionable analytics designed to combat threats
A repo that contains recursive directory listings (using PowerShell) of a vanilla (clean) install of every Windows OS version to compare and see what's been added with each update. Use these CSVs to create your own known good hash sets!
Essential playbooks & runbooks for cybersecurity operations. A dynamic resource for security pros to navigate digital threats, with best practices, incident management protocols, and community-driven updates. Elevate your security strategy and response with our AI-driven guides.
Blue 🧿 Team Welcome to the Blue Team Cyber Investigation Tricks and Tools repository! This collection of resources is designed to aid cybersecurity professionals in defending and securing their networks. Whether you're a seasoned analyst or just getting started, you'll find valuable tools, techniques, and best practices here to enhance you
Check domain in question to VT
Simplifies the process of gathering information about Indicators of Compromise
Add a description, image, and links to the incidentresponse topic page so that developers can more easily learn about it.
To associate your repository with the incidentresponse topic, visit your repo's landing page and select "manage topics."