0sm0s1z / VoltaireLinks
Web application to create indexes for GIAC certification examinations.
☆142Updated 2 years ago
Alternatives and similar repositories for Voltaire
Users that are interested in Voltaire are comparing it to the libraries listed below
Sorting:
- The PoLRBear Project☆35Updated 4 years ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆69Updated 5 years ago
- A port of BHIS's Backdoors & Breaches for playingcards.io☆62Updated 2 years ago
- This was code for analyzing round 1 of the MITRE Enterprise ATT&CK Evaluation. Please check out https://github.com/joshzelonis/Enterprise…☆95Updated 5 years ago
- Powershell - web traffic whitenoise generator☆47Updated 4 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- Tools for simulating threats☆185Updated last year
- All my slides for any talks☆23Updated 7 months ago
- Resources for SANS CTI Summit 2021 presentation☆103Updated last year
- Open-Source PowerShell module to allow online play of Backdoors & Breaches card game devised by Black Hills Information Security☆56Updated 4 years ago
- A curated list of Awesome Threat Intelligence resources☆47Updated 6 years ago
- A GeoIP lookup utility utilizing ipinfo.io services.☆87Updated last year
- links collected from SOC Core Skills class☆85Updated 4 years ago
- Scripts to facilitate filtering with Plaso☆126Updated 5 years ago
- ☆32Updated last year
- ☆20Updated 5 years ago
- ☆42Updated 4 years ago
- an awesome list of active defense resources☆120Updated 4 years ago
- Repository of public reference frameworks for the DFIR community.☆116Updated last year
- Tools to automate and/or expedite response.☆115Updated 10 months ago
- Python library for threat intelligence☆86Updated 4 months ago
- ☆41Updated last year
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆115Updated 7 months ago
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆37Updated 3 years ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆93Updated 4 years ago
- ☆73Updated 2 years ago
- Term concordances for each course in the SANS DFIR curriculum. Used for automated index generation.☆67Updated 4 years ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆122Updated last year
- ☆54Updated 3 years ago
- Mark Baggett's (@MarkBaggett - GSE #15, SANS SEC573 Author) tool for detecting randomness using NLP techniques rather than pure entropy c…☆125Updated 2 years ago