Inovasys-CS / EDI
☆16Updated last week
Alternatives and similar repositories for EDI:
Users that are interested in EDI are comparing it to the libraries listed below
- ☆14Updated 4 months ago
- ☆16Updated last month
- Some important DFIR Resources☆83Updated 2 years ago
- ☆65Updated 2 years ago
- A collection of open source threat detection rules created by Cyber Castle's team.☆14Updated 2 years ago
- Some Threat Hunting queries useful for blue teamers☆125Updated 2 years ago
- Jupyter Notebooks for the Blue Team☆145Updated last week
- Resources To Learn And Understand SIGMA Rules☆174Updated 2 years ago
- A specification and style guide for YARA rules☆47Updated last year
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆31Updated last month
- Repository for sharing examples of our artifacts data and for use in new analyst recruitment.☆49Updated this week
- This repo is where I store my Threat Hunting ideas/content☆87Updated last year
- ☆47Updated last month
- Repository resource for threat hunter☆158Updated 6 years ago
- Just some lists of Malware Configs☆169Updated 2 months ago
- Harness the power of Splunk for your investigations☆95Updated 2 weeks ago
- CarbonBlack EDR detection rules and response actions☆71Updated 6 months ago
- Windows Malware Investigation Scripts & Docs☆81Updated 4 months ago
- Tools for simulating threats☆183Updated last year
- This is a repository dedicated to the DFIR journey. Contains notes, reflections and links to tools.☆68Updated this week
- Collection of scripts and tools related to the eCTHPv2 exam by INE.☆13Updated 2 years ago
- ☆34Updated last year
- A repository of my own Sigma detection rules.☆157Updated 6 months ago
- Incident Response documents and tooling☆69Updated last year
- The Threat Actor Profile Guide for CTI Analysts☆106Updated last year
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆183Updated 3 months ago
- Cyber Attack/Defense home lab using Sliver, LimaCharlie [SIEM], & VM's to simulate C&C, Threat Detection, etc.☆9Updated last year
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆77Updated 3 years ago
- Creation of a laboratory for malware analysis in AWS☆96Updated 2 years ago
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆112Updated last year