0xph03n1x / eCTHPv2Links
Collection of scripts and tools related to the eCTHPv2 exam by INE.
☆18Updated 3 years ago
Alternatives and similar repositories for eCTHPv2
Users that are interested in eCTHPv2 are comparing it to the libraries listed below
Sorting:
- Some important DFIR Resources☆84Updated 2 years ago
- Useful resources about phishing email analysis☆86Updated last year
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆201Updated last year
- Some Threat Hunting queries useful for blue teamers☆131Updated 3 years ago
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆85Updated 3 years ago
- The Threat Actor Profile Guide for CTI Analysts☆116Updated 2 years ago
- SIEM Cheat Sheet☆80Updated 2 years ago
- Repository resource for threat hunter☆158Updated 7 years ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆342Updated last month
- Repository for sharing examples of our artifacts data and for use in new analyst recruitment.☆108Updated 9 months ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆276Updated 10 months ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆192Updated last year
- ☆65Updated 4 months ago
- CLI tools for forensic investigation of Windows artifacts☆349Updated 6 months ago
- ☆192Updated last year
- ☆20Updated 6 years ago
- CarbonBlack EDR detection rules and response actions☆73Updated last year
- ☆59Updated 3 months ago
- A Python script for extracting IP addresses, URLs, headers, and attachments from .eml files. Additional functionalities include defanging…☆42Updated last year
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆103Updated 2 years ago
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆127Updated 2 years ago
- MISP Playbooks☆222Updated 3 months ago
- These are open source rules that can be utilized with QRadar to detect various types of threats in the environment.☆58Updated 6 years ago
- Repository of public reference frameworks for the DFIR community.☆121Updated 2 years ago
- Windows Malware Investigation Scripts & Docs☆85Updated last year
- Incident Response documents and tooling☆111Updated last month
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆162Updated 9 months ago
- A collection of open source threat detection rules created by Cyber Castle's team.☆14Updated 3 years ago
- Harness the power of Splunk for your investigations☆148Updated 3 months ago
- Cyber Underground General Intelligence Requirements☆97Updated last year