Inovasys-CS / EDILinks
☆16Updated last month
Alternatives and similar repositories for EDI
Users that are interested in EDI are comparing it to the libraries listed below
Sorting:
- ☆16Updated 10 months ago
- ☆54Updated this week
- Jupyter Notebooks for the Blue Team☆146Updated 6 months ago
- Repository for sharing examples of our artifacts data and for use in new analyst recruitment.☆107Updated 5 months ago
- Windows Malware Investigation Scripts & Docs☆84Updated 10 months ago
- ☆17Updated 7 months ago
- Some important DFIR Resources☆83Updated 2 years ago
- Harness the power of Splunk for your investigations☆130Updated last week
- Resources To Learn And Understand SIGMA Rules☆180Updated 2 years ago
- Some Threat Hunting queries useful for blue teamers☆128Updated 3 years ago
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆274Updated 3 weeks ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆199Updated last year
- ☆67Updated last week
- A curated repository of incident response playbooks☆100Updated 2 years ago
- Collection of scripts and tools related to the eCTHPv2 exam by INE.☆16Updated 3 years ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆191Updated 9 months ago
- Re-play Adversarial Techniques☆41Updated 4 years ago
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆81Updated 3 years ago
- Repository resource for threat hunter☆158Updated 7 years ago
- Just some lists of Malware Configs☆172Updated 8 months ago
- Exploring hands-on Cybersecurity techniques with a comprehensive repository covering offensive and defensive tools for home-lab environme…☆19Updated last year
- ☆23Updated last year
- Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!☆387Updated last year
- Creation of a laboratory for malware analysis in AWS☆104Updated 2 years ago
- The Threat Actor Profile Guide for CTI Analysts☆114Updated 2 years ago
- Rules generated from our investigations.☆201Updated 3 months ago
- SIEM Cheat Sheet☆76Updated 2 years ago
- SPL cheatsheet for Splunk.☆24Updated 2 years ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆98Updated last year
- CLI tools for forensic investigation of Windows artifacts☆347Updated 2 months ago