Inovasys-CS / EDILinks
☆16Updated this week
Alternatives and similar repositories for EDI
Users that are interested in EDI are comparing it to the libraries listed below
Sorting:
- ☆15Updated 7 months ago
- Collection of scripts and tools related to the eCTHPv2 exam by INE.☆15Updated 3 years ago
- Some important DFIR Resources☆83Updated 2 years ago
- ☆66Updated 2 years ago
- Jupyter Notebooks for the Blue Team☆144Updated 3 months ago
- Windows Malware Investigation Scripts & Docs☆83Updated 7 months ago
- Creation of a laboratory for malware analysis in AWS☆100Updated 2 years ago
- ☆22Updated 10 months ago
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆78Updated 3 years ago
- ☆16Updated 4 months ago
- ☆50Updated this week
- Harness the power of Splunk for your investigations☆111Updated this week
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆85Updated 4 months ago
- Repository for sharing examples of our artifacts data and for use in new analyst recruitment.☆101Updated 2 months ago
- Some Threat Hunting queries useful for blue teamers☆127Updated 3 years ago
- A Python script for extracting IP addresses, URLs, headers, and attachments from .eml files. Additional functionalities include defanging…☆26Updated 8 months ago
- Random notes collected on the intertubes relating to DFIR☆34Updated 2 years ago
- A collection of CVEs weaponized by ransomware operators☆116Updated 2 weeks ago
- A repository of my own Sigma detection rules.☆160Updated 9 months ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆196Updated 11 months ago
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆104Updated 10 months ago
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆31Updated 4 months ago
- Incident Response documents and tooling☆74Updated last year
- A repository to share publicly available Velociraptor detection content☆173Updated this week
- ☆105Updated last month
- A specification and style guide for YARA rules☆48Updated last year
- The Threat Actor Profile Guide for CTI Analysts☆107Updated last year
- CarbonBlack EDR detection rules and response actions☆71Updated 9 months ago
- Cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for them☆28Updated last year
- SIEM Cheat Sheet☆74Updated last year