CyDefOps / project-killchainLinks
Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, techniques, and Indicators of Compromise (IOCs) aiding in cybersecurity operations. It facilitates penetration testing, incident response, digital forensics, and threat hunting.
☆104Updated 10 months ago
Alternatives and similar repositories for project-killchain
Users that are interested in project-killchain are comparing it to the libraries listed below
Sorting:
- SIEM Cheat Sheet☆74Updated last year
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆63Updated last year
- ☆182Updated last year
- ThreatSeeker: Threat Hunting via Windows Event Logs☆121Updated 2 years ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆155Updated 3 months ago
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated last year
- Regular Expressions List used in Digital Forensic Tasks☆87Updated 4 months ago
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆31Updated 4 months ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- Creation of a laboratory for malware analysis in AWS☆101Updated 2 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆102Updated 2 years ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆124Updated last year
- ☆134Updated last year
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆186Updated 6 months ago
- Completely Risky Active-Directory Simulation Hub☆102Updated last year
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆79Updated last month
- Security Operation Center Lab☆19Updated 9 months ago
- Some important DFIR Resources☆84Updated 2 years ago
- Useful resources about phishing email analysis☆84Updated 5 months ago
- Hands-on projects on Static and Dynamic malware analysis with real-world tools.☆18Updated last year
- Just some lists of Malware Configs☆171Updated 6 months ago
- ☆34Updated 8 months ago
- Strumenti di Acquisizione e Analisi di copie Forensi☆155Updated last year
- A collection of CVEs weaponized by ransomware operators☆117Updated last month
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆66Updated last year
- A runbook for handling security incidents in cooperation with 0xsyr0☆51Updated 2 years ago
- All of the Best Links and Resources on Cyber Security☆69Updated 4 months ago
- ☆34Updated 2 years ago
- Some Threat Hunting queries useful for blue teamers☆127Updated 3 years ago
- Track C2 servers, tools, and botnets over time by framework and location☆40Updated 5 months ago