CyDefOps / project-killchainLinks
Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, techniques, and Indicators of Compromise (IOCs) aiding in cybersecurity operations. It facilitates penetration testing, incident response, digital forensics, and threat hunting.
☆109Updated last year
Alternatives and similar repositories for project-killchain
Users that are interested in project-killchain are comparing it to the libraries listed below
Sorting:
- ☆185Updated last year
- Regular Expressions List used in Digital Forensic Tasks☆91Updated 8 months ago
- A collection of companies that disclose adversary TTPs after they have been breached☆255Updated last week
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆190Updated 10 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆122Updated 2 years ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆125Updated last year
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆32Updated 8 months ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆159Updated 6 months ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆106Updated 2 years ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆111Updated 11 months ago
- Track C2 servers, tools, and botnets over time by framework and location☆43Updated 8 months ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆64Updated last year
- Some important DFIR Resources☆83Updated 2 years ago
- Creation of a laboratory for malware analysis in AWS☆104Updated 2 years ago
- ☆13Updated 2 years ago
- ☆134Updated 2 years ago
- Repository for sharing examples of our artifacts data and for use in new analyst recruitment.☆108Updated 6 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆68Updated last year
- Just some lists of Malware Configs☆172Updated 9 months ago
- A collection of CVEs weaponized by ransomware operators☆125Updated last week
- A Python script for extracting IP addresses, URLs, headers, and attachments from .eml files. Additional functionalities include defanging…☆36Updated last year
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆87Updated 3 weeks ago
- SIEM Cheat Sheet☆76Updated 2 years ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆91Updated 5 months ago
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?☆57Updated 3 months ago
- ☆56Updated last month
- IOCs collected during day-to-day activities☆78Updated this week
- Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.☆175Updated last month
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆61Updated last year