CyDefOps / project-killchainLinks
Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, techniques, and Indicators of Compromise (IOCs) aiding in cybersecurity operations. It facilitates penetration testing, incident response, digital forensics, and threat hunting.
☆109Updated last year
Alternatives and similar repositories for project-killchain
Users that are interested in project-killchain are comparing it to the libraries listed below
Sorting:
- ☆134Updated last year
- Regular Expressions List used in Digital Forensic Tasks☆91Updated 7 months ago
- ☆185Updated last year
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆191Updated 9 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆123Updated 2 years ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆157Updated 5 months ago
- Some important DFIR Resources☆83Updated 2 years ago
- A collection of companies that disclose adversary TTPs after they have been breached☆246Updated last year
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆105Updated 2 years ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆64Updated last year
- SIEM Cheat Sheet☆76Updated 2 years ago
- A collection of CVEs weaponized by ransomware operators☆125Updated last month
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆90Updated 4 months ago
- Useful resources about phishing email analysis☆85Updated 8 months ago
- Creation of a laboratory for malware analysis in AWS☆104Updated 2 years ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆125Updated last year
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆86Updated last week
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆32Updated 7 months ago
- CLI tools for forensic investigation of Windows artifacts☆347Updated 2 months ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.☆131Updated 2 weeks ago
- Just some lists of Malware Configs☆172Updated 8 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Updated last year
- Track C2 servers, tools, and botnets over time by framework and location☆43Updated 7 months ago
- Some Threat Hunting queries useful for blue teamers☆128Updated 3 years ago
- Strumenti di Acquisizione e Analisi di copie Forensi☆169Updated last month
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?☆57Updated 2 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆108Updated 11 months ago
- Repository for sharing examples of our artifacts data and for use in new analyst recruitment.☆107Updated 5 months ago
- ☆35Updated 10 months ago