Dutchosintguy / SANS--mic-talk-Telegram-17AUG2020Links
☆20Updated 3 years ago
Alternatives and similar repositories for SANS--mic-talk-Telegram-17AUG2020
Users that are interested in SANS--mic-talk-Telegram-17AUG2020 are comparing it to the libraries listed below
Sorting:
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆55Updated 3 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆145Updated 2 weeks ago
- Random notes collected on the intertubes relating to DFIR☆34Updated 2 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆62Updated 6 months ago
- A curated list of KAPE-related resources☆177Updated 7 months ago
- Resources, tools and utilities about Threat Intelligence☆74Updated 2 years ago
- A GeoIP lookup utility utilizing ipinfo.io services.☆92Updated 2 years ago
- A curated list of Awesome Threat Intelligence resources☆50Updated 7 years ago
- Hunt malware with Volatility☆47Updated 5 months ago
- A sample VHDX file with multiple verbose examples of forensic and anti-forensics artifacts. Meant to be basic and can be expanded upon. P…☆28Updated 2 years ago
- OSINT dating tool for web pages☆123Updated 5 years ago
- Intelligence Architecture Mind Map☆138Updated last year
- A MITRE ATT&CK Lookup Tool☆46Updated last year
- an awesome list of active defense resources☆127Updated 5 years ago
- Links to materials referenced in the SANS Tech Tuesday workshop June 30,2020☆29Updated 5 years ago
- Hunting Newly Registered Domains☆10Updated 6 years ago
- The home of the BriMor Labs rdpieces Perl script that tries to rebuild parsed RDP Bitmap Cache images☆85Updated 2 years ago
- Automagically extract forensic timeline from volatile memory dump☆132Updated last year
- Case_Notes.py is a cross-platform (Windows, macOS, & Linux) python script to help make the documentation process easier.☆26Updated 2 years ago
- Software downloads☆109Updated 7 months ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆125Updated 2 years ago
- Reference sheet for Threat Hunting Professional Course☆25Updated 6 years ago
- Repository of public reference frameworks for the DFIR community.☆120Updated 2 years ago
- Cyber Underground General Intelligence Requirements☆96Updated last year
- A list of Autopsy awesome plugins.☆75Updated 3 years ago
- Major tools used for Digital Forensic Investigation, includes tools used for Image, Audio, Memory, Network and Disk Image data analysis. …☆88Updated 5 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- My Jupyter Notebooks☆36Updated 9 months ago
- It is based on bulk_extractor (https://github.com/simsong/bulk_extractor) and add scanners for record carving☆40Updated 5 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆45Updated 3 years ago