ADEOSec / Digital-Forensic-TrainingLinks
The Chupacabra case study was created by the ADEO dfir team due to the lack of resources and applications in the digital forensics field. Using the Chupacabra case study, you can acquire digital forensics skills or improve your existing skills.
☆23Updated 3 years ago
Alternatives and similar repositories for Digital-Forensic-Training
Users that are interested in Digital-Forensic-Training are comparing it to the libraries listed below
Sorting:
- Useful resources about phishing email analysis☆86Updated last year
- Repository resource for threat hunter☆158Updated 7 years ago
- ☆34Updated 2 years ago
- ☆13Updated 2 years ago
- SIEM Cheat Sheet☆80Updated 2 years ago
- ☆13Updated 3 years ago
- Incident Response with Threat Intelligence, published by Packt☆56Updated last year
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆63Updated 2 years ago
- A curated list of FOSS software appliances for building a SOC☆18Updated 5 years ago
- A ransomware group monitoring bot written in C#.☆57Updated 3 years ago
- Chista | Open Threat Intelligence Framework☆63Updated last year
- Some important DFIR Resources☆84Updated 2 years ago
- Malware Checker Tool generates an HTML report by comparing Hashes, Ip Addresses and URL Addresses through the VirusTotal database.☆36Updated 3 years ago
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆111Updated last year
- The Threat Actor Profile Guide for CTI Analysts☆116Updated 2 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Updated 2 years ago
- Python for Defenders Course Resources☆20Updated 6 months ago
- Some Threat Hunting queries useful for blue teamers☆131Updated 3 years ago
- This Repository gives the best and possible strategies against hunting the ransomware☆26Updated 3 years ago
- ☆65Updated 4 months ago
- A repo for security analytics & threat hunting resources☆22Updated 7 years ago
- ☆20Updated 6 years ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆103Updated 2 years ago
- Quick SOC L1 ticket structure☆40Updated 6 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 3 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆63Updated last year
- Security Operation Center Lab☆21Updated last year
- A collection of open source threat detection rules created by Cyber Castle's team.☆14Updated 3 years ago
- Open Source Cyber Threat Intelligence Feed Collector☆17Updated 4 years ago
- ☆52Updated 5 months ago