ADEOSec / Digital-Forensic-TrainingLinks
The Chupacabra case study was created by the ADEO dfir team due to the lack of resources and applications in the digital forensics field. Using the Chupacabra case study, you can acquire digital forensics skills or improve your existing skills.
☆23Updated 3 years ago
Alternatives and similar repositories for Digital-Forensic-Training
Users that are interested in Digital-Forensic-Training are comparing it to the libraries listed below
Sorting:
- Useful resources about phishing email analysis☆86Updated last year
- Chista | Open Threat Intelligence Framework☆63Updated last year
- Repository resource for threat hunter☆158Updated 7 years ago
- ☆13Updated 2 years ago
- SIEM Cheat Sheet☆80Updated 2 years ago
- Malware Checker Tool generates an HTML report by comparing Hashes, Ip Addresses and URL Addresses through the VirusTotal database.☆36Updated 3 years ago
- A curated list of FOSS software appliances for building a SOC☆18Updated 5 years ago
- ☆65Updated 4 months ago
- Security Operation Center Lab☆21Updated last year
- Some Threat Hunting queries useful for blue teamers☆131Updated 3 years ago
- ☆34Updated 2 years ago
- ☆13Updated 3 years ago
- Some important DFIR Resources☆84Updated 2 years ago
- A ransomware group monitoring bot written in C#.☆57Updated 3 years ago
- The Threat Actor Profile Guide for CTI Analysts☆116Updated 2 years ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆192Updated last year
- ☆79Updated 3 years ago
- Includes voluntary work on all abuses related to earthquakes.☆23Updated 2 years ago
- ☆52Updated 5 months ago
- ☆20Updated 6 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Updated 2 years ago
- Open Source Cyber Threat Intelligence Feed Collector☆17Updated 4 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆63Updated last year
- SOC bilgileri yer almaktadır.☆22Updated 7 months ago
- Quick SOC L1 ticket structure☆40Updated 6 years ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆63Updated 2 years ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆34Updated 8 years ago
- Python for Defenders Course Resources☆20Updated 6 months ago
- A collection of open source threat detection rules created by Cyber Castle's team.☆14Updated 3 years ago
- Cybersecurity Incident Response Plan☆109Updated 5 years ago