Inovasys-CS / EDILinks
☆16Updated last month
Alternatives and similar repositories for EDI
Users that are interested in EDI are comparing it to the libraries listed below
Sorting:
- ☆16Updated 8 months ago
- ☆16Updated 5 months ago
- ☆53Updated 3 weeks ago
- Some important DFIR Resources☆83Updated 2 years ago
- ☆66Updated 2 years ago
- A collection of open source threat detection rules created by Cyber Castle's team.☆15Updated 3 years ago
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆79Updated 3 years ago
- Harness the power of Splunk for your investigations☆121Updated last month
- Windows Malware Investigation Scripts & Docs☆83Updated 9 months ago
- Repository for sharing examples of our artifacts data and for use in new analyst recruitment.☆101Updated 3 months ago
- Jupyter Notebooks for the Blue Team☆144Updated 4 months ago
- A repository to share publicly available Velociraptor detection content☆186Updated this week
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆187Updated 7 months ago
- Collection of scripts and tools related to the eCTHPv2 exam by INE.☆16Updated 3 years ago
- Repository of attack and defensive information for Business Email Compromise investigations☆259Updated 3 months ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆199Updated last year
- A curated repository of incident response playbooks☆93Updated 2 years ago
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆104Updated 11 months ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆154Updated 4 months ago
- Re-play Adversarial Techniques☆38Updated 4 years ago
- SPL cheatsheet for Splunk.☆24Updated 2 years ago
- Repository resource for threat hunter☆158Updated 6 years ago
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆268Updated this week
- Indexes for SANS Courses and GIAC Certifications☆254Updated last year
- Rules generated from our investigations.☆196Updated last month
- Some Threat Hunting queries useful for blue teamers☆127Updated 3 years ago
- The goal of this repo is to archive artifacts from all versions of various OS's and categorizing them by type. This will help with artifa…☆600Updated 5 months ago
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆31Updated 5 months ago
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆85Updated 6 months ago
- Resources To Learn And Understand SIGMA Rules☆180Updated 2 years ago