ADEOSec / Digital-Forensic-Training
The Chupacabra case study was created by the ADEO dfir team due to the lack of resources and applications in the digital forensics field. Using the Chupacabra case study, you can acquire digital forensics skills or improve your existing skills.
☆22Updated 2 years ago
Alternatives and similar repositories for Digital-Forensic-Training:
Users that are interested in Digital-Forensic-Training are comparing it to the libraries listed below
- Malware Checker Tool generates an HTML report by comparing Hashes, Ip Addresses and URL Addresses through the VirusTotal database.☆33Updated 2 years ago
- ☆12Updated last year
- Open Source Cyber Threat Intelligence Feed Collector☆15Updated 3 years ago
- Chista | Open Threat Intelligence Framework☆57Updated 8 months ago
- Useful resources about phishing email analysis☆77Updated 3 years ago
- A curated list of FOSS software appliances for building a SOC☆18Updated 4 years ago
- ☆21Updated 5 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆59Updated last year
- ☆80Updated 2 years ago
- Quick SOC L1 ticket structure☆35Updated 5 years ago
- A repo for security analytics & threat hunting resources☆21Updated 6 years ago
- ☆13Updated 2 years ago
- SIEM Cheat Sheet☆73Updated last year
- A ransomware group monitoring bot written in C#.☆55Updated 2 years ago
- Some important DFIR Resources☆83Updated last year
- ☆33Updated last year
- Repository resource for threat hunter☆158Updated 6 years ago
- Malware Analysis (Zararlı Yazılım Analizi)☆31Updated 5 years ago
- The Threat Actor Profile Guide for CTI Analysts☆103Updated last year
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆11Updated 4 months ago
- ☆64Updated 2 years ago
- Security Operation Center Lab☆16Updated 3 months ago
- Advanced Threat Hunting: Ransomware Group☆18Updated last month
- Python for Defenders Course Resources☆16Updated 10 months ago
- This repository was developed using .NET 7.0 API technology based on findings listed in the OWASP 2019 API Security Top 10.☆53Updated last year
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆60Updated last year
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆59Updated 6 months ago
- Cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for them☆26Updated 11 months ago
- Reports of cyber threat intelligence☆13Updated last year