CyDefOps / project-killchainLinks
Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, techniques, and Indicators of Compromise (IOCs) aiding in cybersecurity operations. It facilitates penetration testing, incident response, digital forensics, and threat hunting.
☆111Updated last year
Alternatives and similar repositories for project-killchain
Users that are interested in project-killchain are comparing it to the libraries listed below
Sorting:
- ☆192Updated last year
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆192Updated last year
- SIEM Cheat Sheet☆80Updated 2 years ago
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆31Updated 11 months ago
- Useful resources about phishing email analysis☆86Updated last year
- ThreatSeeker: Threat Hunting via Windows Event Logs☆124Updated 2 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆106Updated 3 years ago
- ☆132Updated 2 years ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆93Updated 8 months ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆63Updated 2 years ago
- Some important DFIR Resources☆84Updated 2 years ago
- Regular Expressions List used in Digital Forensic Tasks☆92Updated 11 months ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆162Updated 9 months ago
- A collection of companies that disclose adversary TTPs after they have been breached☆289Updated 2 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆126Updated last year
- A collection of CVEs weaponized by ransomware operators☆129Updated 3 months ago
- With EmailAnalyzer you can analyze your suspicious emails. You can extract headers, links, and hashes from the .eml file and you can gene…☆286Updated 2 years ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- ☆34Updated 2 years ago
- Completely Risky Active-Directory Simulation Hub☆102Updated 2 years ago
- Creation of a laboratory for malware analysis in AWS☆105Updated 3 years ago
- Some Threat Hunting queries useful for blue teamers☆131Updated 3 years ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆115Updated last year
- Track C2 servers, tools, and botnets over time by framework and location☆43Updated 11 months ago
- ☆59Updated 3 months ago
- ☆13Updated 3 years ago
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?☆59Updated 6 months ago
- MISP Playbooks☆222Updated 3 months ago
- A Python script for extracting IP addresses, URLs, headers, and attachments from .eml files. Additional functionalities include defanging…☆42Updated last year
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Updated 2 years ago