ADEOSec / Digital-Forensic-Training
The Chupacabra case study was created by the ADEO dfir team due to the lack of resources and applications in the digital forensics field. Using the Chupacabra case study, you can acquire digital forensics skills or improve your existing skills.
☆22Updated 3 years ago
Alternatives and similar repositories for Digital-Forensic-Training
Users that are interested in Digital-Forensic-Training are comparing it to the libraries listed below
Sorting:
- Malware Checker Tool generates an HTML report by comparing Hashes, Ip Addresses and URL Addresses through the VirusTotal database.☆36Updated 3 years ago
- Useful resources about phishing email analysis☆83Updated 3 months ago
- Open Source Cyber Threat Intelligence Feed Collector☆16Updated 3 years ago
- ☆12Updated 2 years ago
- ☆48Updated last week
- Chista | Open Threat Intelligence Framework☆58Updated 11 months ago
- A repo for security analytics & threat hunting resources☆21Updated 6 years ago
- Privilege Escalation MindMap☆15Updated 4 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆64Updated last year
- ☆21Updated 5 years ago
- A curated list of FOSS software appliances for building a SOC☆18Updated 4 years ago
- Repository resource for threat hunter☆158Updated 6 years ago
- SIEM Cheat Sheet☆73Updated last year
- ☆13Updated 2 years ago
- Malware Analysis (Zararlı Yazılım Analizi)☆31Updated 5 years ago
- Quick SOC L1 ticket structure☆35Updated 5 years ago
- ☆44Updated 9 years ago
- ☆80Updated 2 years ago
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆38Updated 3 years ago
- This repository was developed using .NET 7.0 API technology based on findings listed in the OWASP 2019 API Security Top 10.☆55Updated last year
- A ransomware group monitoring bot written in C#.☆56Updated 3 years ago
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆11Updated 8 months ago
- A collection of various SIEM rules relating to malware family groups.☆66Updated 10 months ago
- ☆65Updated 2 years ago
- Some Threat Hunting queries useful for blue teamers☆126Updated 3 years ago
- ☆34Updated last year
- Reports of cyber threat intelligence☆13Updated 2 years ago
- Cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for them☆28Updated last year
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆87Updated last year
- The Threat Actor Profile Guide for CTI Analysts☆106Updated last year