Dutchosintguy / OSINT-workshop-sans
Links to materials referenced in the SANS Tech Tuesday workshop June 30,2020
☆29Updated 4 years ago
Alternatives and similar repositories for OSINT-workshop-sans:
Users that are interested in OSINT-workshop-sans are comparing it to the libraries listed below
- Admin for☆15Updated 6 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago
- ☆40Updated 4 years ago
- A MITRE ATT&CK Lookup Tool☆45Updated 10 months ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆56Updated last month
- Reference sheet for Threat Hunting Professional Course☆25Updated 5 years ago
- Black Friday deals (Cyber/OSINT/Infosec)☆28Updated 4 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- ☆30Updated 6 years ago
- ☆21Updated 3 years ago
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆27Updated 4 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Updated 4 years ago
- Threat Hunter's Knowledge Base☆22Updated 3 years ago
- CSIRT Jump Bag☆27Updated 10 months ago
- Random notes collected on the intertubes relating to DFIR☆32Updated last year
- For storing of the volumes☆4Updated 5 years ago
- Tool used to perform threat intelligence against packet data☆35Updated last month
- Dictionary of CTI-related acronyms, terms, and jargon☆140Updated last year
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- Hashes of infamous malware☆25Updated last year
- Logbook for Digital Forensics and Incident Response☆50Updated 7 months ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆48Updated 2 years ago
- ☆28Updated 4 years ago
- A sample VHDX file with multiple verbose examples of forensic and anti-forensics artifacts. Meant to be basic and can be expanded upon. P…☆25Updated 2 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆22Updated 3 years ago
- Cheat sheets for threat hunting, detection and other stuff.☆33Updated 2 years ago
- A curated list of Awesome Threat Intelligence resources☆47Updated 6 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆24Updated 2 months ago