Dutchosintguy / OSINT-workshop-sans
Links to materials referenced in the SANS Tech Tuesday workshop June 30,2020
☆26Updated 3 years ago
Related projects: ⓘ
- ☆38Updated this week
- Admin for☆15Updated 6 years ago
- ☆40Updated 3 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆49Updated 2 years ago
- Black Friday deals (Cyber/OSINT/Infosec)☆28Updated 3 years ago
- Reference sheet for Threat Hunting Professional Course☆24Updated 5 years ago
- Hashes of infamous malware☆24Updated last year
- Threat Hunter's Knowledge Base☆21Updated 2 years ago
- Backstage Parser☆32Updated 2 years ago
- Tool used to perform threat intelligence against packet data☆34Updated 5 months ago
- A sample VHDX file with multiple verbose examples of forensic and anti-forensics artifacts. Meant to be basic and can be expanded upon. P…☆25Updated last year
- ☆21Updated 3 years ago
- Random notes collected on the intertubes relating to DFIR☆32Updated last year
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆29Updated last year
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆23Updated 2 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆30Updated last year
- A MITRE ATT&CK Lookup Tool☆41Updated 4 months ago
- Let's obscure some IPv4 addresses☆36Updated last year
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 4 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆16Updated 5 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆55Updated 2 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Updated 5 years ago
- Use the Hacker Target IP Tools API for Reconnaissance in Maltego☆50Updated 3 years ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆89Updated 3 years ago
- ☆20Updated 2 years ago
- ☆19Updated 5 years ago
- ☆20Updated last year
- My Jupyter Notebooks☆36Updated 5 months ago
- Collection of videos of Raids on Cybercriminals☆17Updated 3 months ago
- ☆28Updated 3 years ago