ADEOSec / Digital-Forensic-Training
The Chupacabra case study was created by the ADEO dfir team due to the lack of resources and applications in the digital forensics field. Using the Chupacabra case study, you can acquire digital forensics skills or improve your existing skills.
☆22Updated 2 years ago
Alternatives and similar repositories for Digital-Forensic-Training:
Users that are interested in Digital-Forensic-Training are comparing it to the libraries listed below
- Malware Checker Tool generates an HTML report by comparing Hashes, Ip Addresses and URL Addresses through the VirusTotal database.☆36Updated 3 years ago
- Open Source Cyber Threat Intelligence Feed Collector☆16Updated 3 years ago
- Useful resources about phishing email analysis☆82Updated 2 months ago
- ☆12Updated 2 years ago
- Chista | Open Threat Intelligence Framework☆58Updated 11 months ago
- A ransomware group monitoring bot written in C#.☆56Updated 3 years ago
- A curated list of FOSS software appliances for building a SOC☆18Updated 4 years ago
- A repo for security analytics & threat hunting resources☆21Updated 6 years ago
- Repository resource for threat hunter☆158Updated 6 years ago
- ☆13Updated 2 years ago
- Quick SOC L1 ticket structure☆35Updated 5 years ago
- This repository was developed using .NET 7.0 API technology based on findings listed in the OWASP 2019 API Security Top 10.☆55Updated last year
- ☆80Updated 2 years ago
- ☆65Updated 2 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆64Updated last year
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆12Updated 7 months ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆33Updated 7 years ago
- SIEM Cheat Sheet☆73Updated last year
- ☆47Updated last week
- Python for Defenders Course Resources☆16Updated last year
- ☆44Updated 9 years ago
- This Repository gives the best and possible strategies against hunting the ransomware☆26Updated 2 years ago
- The Threat Actor Profile Guide for CTI Analysts☆106Updated last year
- ☆34Updated last year
- Repository of tools and resources for analyzing Docker containers☆65Updated last year
- Sharing our knowledge and resources in the field of cyber security.☆22Updated 2 years ago
- Malware Analysis (Zararlı Yazılım Analizi)☆31Updated 5 years ago
- Privilege Escalation MindMap☆15Updated 4 years ago
- Reports of cyber threat intelligence☆13Updated 2 years ago
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆38Updated 3 years ago