A curated list of Site Reliability and Production Engineering resources.
-
Updated
May 30, 2022
{{ message }}
A curated list of Site Reliability and Production Engineering resources.
A curated collection of publicly available resources on how technology and tech-savvy organizations around the world practice Site Reliability Engineering (SRE)
List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.
A curated list of tools for incident response
Wazuh - The Open Source Security Platform
TheHive: a Scalable, Open Source and Free Security Incident Response Platform
Intel Owl: analyze files, domains, IPs in multiple ways from a single API at scale
The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file system data. The library can be incorporated into larger digital forensics tools and the command line tools can be directly used to find evidence.
Monzo's real-time incident response and reporting tool
Digging Deeper....
A list of cyber-chef recipes and curated links
Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.
PagerDuty's Incident Response Documentation.
Cortex: a Powerful Observable Analysis and Active Response Engine
GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]
Unit tests need to be created that tests obfuscating with all possible Mutator permutations that are 2 Mutators long. So basically given the dozen or so current Mutators, make sure Mutators don't just work on their separately, but together as well. I've run into a few random cases where using Mutators in specific combinations produces faulty payloads, and want a test that can do this for me.
Us
the file output bot supports message_with_type, but the docs don't mention it.
All output bots using OutputBot.export_event support the same parameters, the docs could have a section on those and then these bots' docs just refer to the section
FAME Automates Malware Evaluation
A repository for using osquery for incident detection and response
APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the sea of windows event logs to decrease the time to uncover suspicious activity
A collection of resources for Threat Hunters - Sponsored by Falcon Guard
Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.
Set of Mindmaps providing a detailed overview of the different #Microsoft auditing capacities for Windows, Exchange, Azure,...
OPCDE Cybersecurity Conference Materials
ThePhish: an automated phishing email analysis tool
ASN / RPKI validity / BGP stats / IPv4v6 / Prefix / URL / ASPath / Organization / IP reputation / IP geolocation / IP fingerprinting / Network recon / lookup API server / Web traceroute server
A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365
I think that you are doing a very necessary system and your idea is cool, but at the moment it has a lot of bugs. From what I noticed, the assets do not understand the ascii characters and the system crashes. In addition, I did not find a description of the API, I would like to integrate your system into TheHive, or rather make it possible to view information about an asset in TheHive. I believe t
Digital Forensics Investigation Platform
Add a description, image, and links to the incident-response topic page so that developers can more easily learn about it.
To associate your repository with the incident-response topic, visit your repo's landing page and select "manage topics."