CyberConTraining / DDTTX
DDTTX Tabletop Trainings
☆28Updated 3 years ago
Alternatives and similar repositories for DDTTX:
Users that are interested in DDTTX are comparing it to the libraries listed below
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆69Updated 4 years ago
- A port of BHIS's Backdoors & Breaches for playingcards.io☆62Updated 2 years ago
- Resources for SANS CTI Summit 2021 presentation☆102Updated last year
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆114Updated 6 months ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆121Updated 4 years ago
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆37Updated 3 years ago
- ☆42Updated 2 years ago
- A community event for security researchers to share their favorite notebooks☆107Updated last year
- This was code for analyzing round 1 of the MITRE Enterprise ATT&CK Evaluation. Please check out https://github.com/joshzelonis/Enterprise…☆95Updated 5 years ago
- A collection of Splunk's Search Processing Language (SPL) for Threat Hunting with CrowdStrike Falcon☆201Updated 4 years ago
- BulkStrike enables the usage of CrowdStrike Real Time Response (RTR) to bulk execute commands on multiple machines.☆42Updated 2 years ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆53Updated 2 years ago
- Full of public notes and Utilities☆98Updated 2 months ago
- ☆93Updated 2 years ago
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆25Updated 11 months ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆133Updated 2 years ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆114Updated last year
- Conference presentations☆47Updated last year
- ☆41Updated 11 months ago
- ☆42Updated 4 years ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆81Updated last year
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆67Updated last year
- Web application to create indexes for GIAC certification examinations.☆138Updated 2 years ago
- Defensive Origins Training Schedule☆38Updated last year
- The PoLRBear Project☆35Updated 4 years ago
- ☆131Updated last year
- Tools for simulating threats☆183Updated last year
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆77Updated 11 months ago
- Cybersecurity Incident Response Plan☆90Updated 4 years ago