0xrajneesh / Incident-Response-Projects-for-BeginnersView external linksLinks
Hands-on cybersecurity projects to enhance skills in phishing investigation, malware analysis, network intrusion detection, and DDoS attack response.
☆243Jun 3, 2024Updated last year
Alternatives and similar repositories for Incident-Response-Projects-for-Beginners
Users that are interested in Incident-Response-Projects-for-Beginners are comparing it to the libraries listed below
Sorting:
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Jul 15, 2024Updated last year
- Get hands-on with OSINT tools such as Recon-ng, Maltego, Shodan and Sherlock☆26May 23, 2024Updated last year
- Hands-on cybersecurity training projects for beginners to learn vulnerability management and essential skills☆157Jun 20, 2024Updated last year
- ☆145Jun 17, 2024Updated last year
- A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as …☆421Aug 10, 2025Updated 6 months ago
- ☆22Aug 29, 2024Updated last year
- Cast your OSINT net further a field and see what else you can discover on the Internet.☆92Nov 29, 2025Updated 2 months ago
- You will find a wealth of resources to help with your Website investigations.☆265Jan 3, 2026Updated last month
- ☆12Jan 8, 2026Updated last month
- This repository contains tutorials and tools for working with IP search engines. Search engines that search all devices connected to the …☆309Aug 27, 2025Updated 5 months ago
- I developed a rigorous cybersecurity project portfolio on mock clients covering NIST, audits, Linux, SQL, assets, threats, vulnerabilitie…☆147Jul 19, 2025Updated 6 months ago
- Download all of a given user's public Pastebin pastes☆32Apr 16, 2025Updated 10 months ago
- Awesome Security lists for SOC/CERT/CTI☆1,247Updated this week
- Yet Another Mac Changer!!!☆12Jan 26, 2023Updated 3 years ago
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆17Mar 27, 2024Updated last year
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆171Mar 17, 2025Updated 11 months ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆39Sep 29, 2025Updated 4 months ago
- Search information across a youtube Channel☆15Dec 10, 2024Updated last year
- Various Topics☆18Apr 30, 2025Updated 9 months ago
- The goal of this guide is very simple - to teach anyone interested in cyber security, regardless of their knowledge level, how to make th…☆833Jun 27, 2025Updated 7 months ago
- A good selection of Privacy & Infosec tools that will help you understand more about how to protect your online privacy and security.☆133Dec 21, 2025Updated last month
- OSINT Timeline Weekly Newsletter with collection of tools, services and investigations☆134Updated this week
- unix_collector is a Live Response collection script for Incident Response on UNIX-like systems using native binaries. Supports AIX, Andro…☆41Jun 10, 2025Updated 8 months ago
- Passive Web Vulnerability Detection Tool☆37May 5, 2025Updated 9 months ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆192Dec 20, 2024Updated last year
- This directory contains presentations and related materials of my speaking engagements. I also use this to record historical presentation…☆17Feb 13, 2025Updated last year
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆757Jan 28, 2025Updated last year
- Hands-on cybersecurity training projects for beginners, focusing on vulnerability management, incident response, and log analysis☆161Jun 27, 2024Updated last year
- Unlock the power of Splunk SIEM for comprehensive log analysis. Collaborate and innovate with our Splunk Log Analysis Projects on GitHub☆383Jun 17, 2024Updated last year
- A collection of sources of documentation, as well as field best practices, to build/run a SOC☆1,621Updated this week
- POC for CVE-2024-40348. Will attempt to read /etc/passwd from target☆32Jul 21, 2024Updated last year
- In this repository you will find sample commands and test files for each day of the course "Linux for OSINT. A 21-day course for beginner…☆571Jan 6, 2026Updated last month
- Custom mini tools during Red Teaming engagements☆23Jan 20, 2026Updated 3 weeks ago
- A curated list of awesome threat detection and hunting resources☆16Sep 12, 2018Updated 7 years ago
- A Personal Collection of Infosec Dorks☆213Jun 14, 2023Updated 2 years ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆633Aug 4, 2025Updated 6 months ago
- Linux Evidence Acquisition Framework☆119Sep 30, 2024Updated last year
- KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunt…☆1,634Updated this week
- CLI tools for forensic investigation of Windows artifacts☆349Jul 21, 2025Updated 6 months ago