0xHasanM / MISC
☆16Updated 2 months ago
Alternatives and similar repositories for MISC:
Users that are interested in MISC are comparing it to the libraries listed below
- Cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for them☆26Updated 10 months ago
- Jupyter Notebooks for the Blue Team☆34Updated this week
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆42Updated 2 years ago
- ☆64Updated 2 years ago
- Simple Script to Help You Find All Files Has Been Modified, Accessed, and Created In A Range Time.☆27Updated 2 years ago
- A collection of open source threat detection rules created by Cyber Castle's team.☆14Updated 2 years ago
- Contains compiled binaries of Volatility☆30Updated 3 months ago
- This Repository gives the best and possible strategies against hunting the ransomware☆25Updated 2 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆74Updated 2 years ago
- Linux Baseline and Forensic Triage Tool - BETA☆52Updated 2 years ago
- ☆63Updated last year
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆77Updated 3 years ago
- Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)☆68Updated last year
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- ☆33Updated last year
- Ansible playbooks for the Seclab project☆12Updated 2 years ago
- My own diary notes. Adding the commands, tools, techniques, and resources that I will not memorize.☆15Updated last year
- A learning and testing environment for web application hacking and pentesting.☆25Updated 4 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆26Updated 7 months ago
- ☆62Updated 3 years ago
- Sniffing out well-known threat groups☆28Updated 5 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆50Updated last month
- ☆14Updated 5 years ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆45Updated this week
- Malware Analysis Tools☆29Updated 5 years ago
- ☆21Updated 5 years ago
- Regexplore is a Volatility plugin designed to mimic the functionality of the Registry Explorer plugins in EZsuite☆17Updated last year
- Malware Samples that could be used for teaching students about malware analysis.☆51Updated 9 months ago