ADEOSec / Digital-Forensic-TrainingLinks
The Chupacabra case study was created by the ADEO dfir team due to the lack of resources and applications in the digital forensics field. Using the Chupacabra case study, you can acquire digital forensics skills or improve your existing skills.
☆22Updated 3 years ago
Alternatives and similar repositories for Digital-Forensic-Training
Users that are interested in Digital-Forensic-Training are comparing it to the libraries listed below
Sorting:
- ☆12Updated 2 years ago
- Malware Checker Tool generates an HTML report by comparing Hashes, Ip Addresses and URL Addresses through the VirusTotal database.☆36Updated 3 years ago
- Chista | Open Threat Intelligence Framework☆58Updated last year
- Useful resources about phishing email analysis☆84Updated 4 months ago
- Quick SOC L1 ticket structure☆36Updated 6 years ago
- Open Source Cyber Threat Intelligence Feed Collector☆16Updated 3 years ago
- A repo for security analytics & threat hunting resources☆21Updated 6 years ago
- ☆79Updated 3 years ago
- Malware Analysis (Zararlı Yazılım Analizi)☆31Updated 5 years ago
- A curated list of FOSS software appliances for building a SOC☆18Updated 4 years ago
- ☆13Updated 2 years ago
- Repository resource for threat hunter☆158Updated 6 years ago
- Privilege Escalation MindMap☆15Updated 5 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆66Updated last year
- ☆34Updated 2 years ago
- ☆44Updated 9 years ago
- Includes voluntary work on all abuses related to earthquakes.☆23Updated 2 years ago
- Python for Defenders Course Resources☆18Updated last year
- SIEM Cheat Sheet☆74Updated last year
- FastVulnVerify is an advanced Python tool developed to quickly identify common vulnerabilities encountered during penetration testing and…☆36Updated 9 months ago
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆11Updated 9 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆96Updated 7 months ago
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆39Updated 4 years ago
- Random notes collected on the intertubes relating to DFIR☆34Updated 2 years ago
- A ransomware group monitoring bot written in C#.☆57Updated 3 years ago
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆26Updated 7 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆61Updated 11 months ago
- ☆51Updated last week
- ☆12Updated 2 years ago
- ☆21Updated 5 years ago