0xrajneesh / Home-Lab
Exploring hands-on Cybersecurity techniques with a comprehensive repository covering offensive and defensive tools for home-lab environment
☆15Updated 10 months ago
Alternatives and similar repositories for Home-Lab:
Users that are interested in Home-Lab are comparing it to the libraries listed below
- Some important DFIR Resources☆83Updated last year
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆218Updated last year
- Windows Malware Investigation Scripts & Docs☆75Updated 2 months ago
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆99Updated 5 months ago
- SIEM Cheat Sheet☆73Updated last year
- ☆162Updated 10 months ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆190Updated 6 months ago
- ☆27Updated last month
- ☆45Updated last week
- Hands-on cybersecurity projects to enhance skills in phishing investigation, malware analysis, network intrusion detection, and DDoS atta…☆102Updated 7 months ago
- Creation of a laboratory for malware analysis in AWS☆91Updated 2 years ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆171Updated last month
- ☆95Updated 2 weeks ago
- Harness the power of Splunk for your investigations☆84Updated 2 months ago
- R3D SSH Hunter: The Ultimate SSH Key and Bad Guy Tracker☆13Updated 2 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆69Updated 3 months ago
- Hands-on cybersecurity training projects for beginners, focusing on vulnerability management, incident response, and log analysis☆24Updated 7 months ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆150Updated 8 months ago
- Tools for simulating threats☆181Updated last year
- CarbonBlack EDR detection rules and response actions☆71Updated 4 months ago
- A Python script for analyzing email files to extract IP addresses, URLs, headers, and attachments, with functionalities for defanging IPs…☆17Updated 3 months ago
- Jupyter Notebooks for the Blue Team☆144Updated 2 years ago
- Scripts for rapid Windows endpoint "tactical triage" and investigations with Velociraptor and KAPE☆109Updated 2 weeks ago
- DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital For…☆152Updated this week
- Unlock the power of Splunk SIEM for comprehensive log analysis. Collaborate and innovate with our Splunk Log Analysis Projects on GitHub☆108Updated 7 months ago
- The Threat Actor Profile Guide for CTI Analysts☆103Updated last year
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆177Updated this week
- A collection of CVEs weaponized by ransomware operators☆103Updated 3 weeks ago
- A repository to share publicly available Velociraptor detection content☆124Updated this week
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆75Updated 2 years ago