Inovasys-CS / EDILinks
☆17Updated 3 weeks ago
Alternatives and similar repositories for EDI
Users that are interested in EDI are comparing it to the libraries listed below
Sorting:
- ☆16Updated 11 months ago
- Some important DFIR Resources☆83Updated 2 years ago
- ☆55Updated 2 weeks ago
- Harness the power of Splunk for your investigations☆139Updated 3 weeks ago
- ☆17Updated 8 months ago
- Repository for sharing examples of our artifacts data and for use in new analyst recruitment.☆108Updated 6 months ago
- Windows Malware Investigation Scripts & Docs☆85Updated last year
- Jupyter Notebooks for the Blue Team☆147Updated 7 months ago
- Some Threat Hunting queries useful for blue teamers☆130Updated 3 years ago
- ☆67Updated last month
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆283Updated last week
- A repository to share publicly available Velociraptor detection content☆189Updated this week
- Resources To Learn And Understand SIGMA Rules☆181Updated 2 years ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆189Updated 10 months ago
- Repository of attack and defensive information for Business Email Compromise investigations☆267Updated 5 months ago
- A collection of open source threat detection rules created by Cyber Castle's team.☆14Updated 3 years ago
- A starter pack of resources to help you get started in Detection Engineering.☆175Updated 2 months ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆199Updated last year
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆82Updated 3 years ago
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆109Updated last year
- A repository to store community malware research notes and findings.☆14Updated 3 months ago
- Incident Response documents and tooling☆108Updated 2 months ago
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆32Updated 8 months ago
- Tools for simulating threats☆196Updated 2 years ago
- ☆34Updated 2 years ago
- CarbonBlack EDR detection rules and response actions☆73Updated last year
- A repository of my own Sigma detection rules.☆162Updated last year
- ☆94Updated 3 months ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆102Updated last year
- The Threat Actor Profile Guide for CTI Analysts☆115Updated 2 years ago