ADEOSec / Digital-Forensic-TrainingLinks
The Chupacabra case study was created by the ADEO dfir team due to the lack of resources and applications in the digital forensics field. Using the Chupacabra case study, you can acquire digital forensics skills or improve your existing skills.
☆22Updated 3 years ago
Alternatives and similar repositories for Digital-Forensic-Training
Users that are interested in Digital-Forensic-Training are comparing it to the libraries listed below
Sorting:
- Useful resources about phishing email analysis☆85Updated 8 months ago
- Repository resource for threat hunter☆158Updated 7 years ago
- ☆13Updated 2 years ago
- Chista | Open Threat Intelligence Framework☆59Updated last year
- Quick SOC L1 ticket structure☆39Updated 6 years ago
- SIEM Cheat Sheet☆76Updated 2 years ago
- ☆21Updated 6 years ago
- ☆34Updated 2 years ago
- A curated list of FOSS software appliances for building a SOC☆18Updated 4 years ago
- ☆67Updated 3 weeks ago
- Open Source Cyber Threat Intelligence Feed Collector☆17Updated 4 years ago
- The Threat Actor Profile Guide for CTI Analysts☆114Updated 2 years ago
- ☆13Updated 2 years ago
- Malware Checker Tool generates an HTML report by comparing Hashes, Ip Addresses and URL Addresses through the VirusTotal database.☆36Updated 3 years ago
- Some important DFIR Resources☆83Updated 2 years ago
- Some Threat Hunting queries useful for blue teamers☆128Updated 3 years ago
- Includes voluntary work on all abuses related to earthquakes.☆23Updated 2 years ago
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆81Updated 3 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆68Updated last year
- Dictionary of CTI-related acronyms, terms, and jargon☆144Updated last year
- A collection of open source threat detection rules created by Cyber Castle's team.☆14Updated 3 years ago
- A ransomware group monitoring bot written in C#.☆57Updated 3 years ago
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆40Updated 4 years ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆100Updated last year
- A repo for security analytics & threat hunting resources☆21Updated 7 years ago
- Cybersecurity Incident Response Plan☆105Updated 5 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 3 years ago
- Collection of scripts and tools related to the eCTHPv2 exam by INE.☆16Updated 3 years ago
- Random notes collected on the intertubes relating to DFIR☆34Updated 2 years ago
- Security Operation Center Lab☆19Updated last year