ADEOSec / Digital-Forensic-Training
The Chupacabra case study was created by the ADEO dfir team due to the lack of resources and applications in the digital forensics field. Using the Chupacabra case study, you can acquire digital forensics skills or improve your existing skills.
☆22Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Digital-Forensic-Training
- ☆12Updated last year
- Useful resources about phishing email analysis☆76Updated 2 years ago
- Chista | Open Threat Intelligence Framework☆53Updated 6 months ago
- ☆80Updated 2 years ago
- Open Source Cyber Threat Intelligence Feed Collector☆15Updated 3 years ago
- Malware Checker Tool generates an HTML report by comparing Hashes, Ip Addresses and URL Addresses through the VirusTotal database.☆33Updated 2 years ago
- ☆43Updated 7 months ago
- This repository was developed using .NET 7.0 API technology based on findings listed in the OWASP 2019 API Security Top 10.☆50Updated last year
- Sharing our knowledge and resources in the field of cyber security.☆21Updated 2 years ago
- A curated list of FOSS software appliances for building a SOC☆18Updated 3 years ago
- CEH V11 Türkçe Kitap Çevirisi☆3Updated last year
- ☆32Updated last year
- FastVulnVerify is an advanced Python tool developed to quickly identify common vulnerabilities encountered during penetration testing and…☆34Updated 2 months ago
- Quick SOC L1 ticket structure☆35Updated 5 years ago
- ☆21Updated 5 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆59Updated 10 months ago
- Repository resource for threat hunter☆158Updated 6 years ago
- Includes voluntary work on all abuses related to earthquakes.☆23Updated last year
- Security Operation Center Lab☆15Updated last month
- ☆12Updated 2 years ago
- ☆13Updated last year
- Reports of cyber threat intelligence☆14Updated last year
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆36Updated 3 years ago
- SIEM Cheat Sheet☆72Updated last year
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆11Updated 2 months ago
- ☆63Updated last year
- A collection of open source threat detection rules created by Cyber Castle's team.☆14Updated 2 years ago
- Malware Analysis (Zararlı Yazılım Analizi)☆30Updated 5 years ago