0xph03n1x / eCTHPv2
Collection of scripts and tools related to the eCTHPv2 exam by INE.
☆12Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for eCTHPv2
- Some important DFIR Resources☆82Updated last year
- ☆63Updated last year
- Some Threat Hunting queries useful for blue teamers☆123Updated 2 years ago
- The Threat Actor Profile Guide for CTI Analysts☆97Updated last year
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆71Updated 2 years ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆186Updated 4 months ago
- CarbonBlack EDR detection rules and response actions☆71Updated 2 months ago
- Useful resources about phishing email analysis☆76Updated 2 years ago
- ☆21Updated 5 years ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆158Updated last week
- This repo is where I store my Threat Hunting ideas/content☆85Updated last year
- SIEM Cheat Sheet☆72Updated last year
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆59Updated 4 months ago
- Cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for them☆26Updated 8 months ago
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆36Updated 3 years ago
- A collection of CVEs weaponized by ransomware operators☆74Updated this week
- Windows Malware Investigation Scripts & Docs☆75Updated 2 weeks ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 6 months ago
- Cyber Underground General Intelligence Requirements☆89Updated 9 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆59Updated 10 months ago
- links collected from SOC Core Skills class☆84Updated 3 years ago
- These are open source rules that can be utilized with QRadar to detect various types of threats in the environment.☆51Updated 5 years ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆54Updated last year
- Resources from the Security Presentation☆11Updated 3 weeks ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆148Updated 6 months ago
- Random notes collected on the intertubes relating to DFIR☆32Updated last year
- A collection of open source threat detection rules created by Cyber Castle's team.☆14Updated 2 years ago
- Data from Dark Web Marketplace scraping - Be careful☆35Updated 3 weeks ago
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆109Updated last year
- ☆32Updated last year