Repo of KC7 challenge scenarios
☆26Aug 30, 2025Updated 6 months ago
Alternatives and similar repositories for kc7_data
Users that are interested in kc7_data are comparing it to the libraries listed below
Sorting:
- A cybersecurity game in Azure Data Explorer☆174Jul 12, 2024Updated last year
- Azure AD Incident Response☆27Oct 8, 2021Updated 4 years ago
- An HTTP proxy library for Go☆17Jun 22, 2022Updated 3 years ago
- ☆29Feb 23, 2026Updated last week
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Jul 22, 2025Updated 7 months ago
- Silk File Reader☆14Mar 9, 2022Updated 3 years ago
- Three datasets to practice Threat Hunting against.☆46Jan 3, 2024Updated 2 years ago
- Just a data☆11Oct 20, 2025Updated 4 months ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- A basic python based tool for domain ℹ️ information gathering. I am working 💻 on collecting information related to domain whois, history…☆12Jan 11, 2026Updated last month
- A collection of Python resources for Blue Team security work☆16Sep 23, 2018Updated 7 years ago
- Is a portable forensic tool for analyzing Windows logs, pre-organized according to the methodology outlined in this job: https://cybersec…☆15Jul 19, 2025Updated 7 months ago
- ☆11Feb 22, 2022Updated 4 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- PowerShell script to get domain mail info and control status such as MX, SPF, DKIM, DMARC and StartTLS.☆12May 20, 2025Updated 9 months ago
- Analyst Tool to automate some of an analyst's daily investigation tasks. In both python script and Jupyter Notebook format.☆15Nov 24, 2025Updated 3 months ago
- Plugin that serves the ATT&CK website alongside CALDERA.☆12Feb 24, 2020Updated 6 years ago
- ☆10Mar 31, 2021Updated 4 years ago
- Forensic tool for extracting and analyzing Google DriveFS cached files and metadata.☆19May 9, 2025Updated 9 months ago
- Writeups of some of PicoCTF 2017 challenges.☆10Aug 3, 2018Updated 7 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated last week
- Network Security docos☆17Mar 3, 2025Updated 11 months ago
- cryptam document malware analysis tool☆12Jun 18, 2023Updated 2 years ago
- An automation framework for deploying Microsoft Sentinel environments using pipelines. This project combines infrastructure-as-code (Bice…☆22Jul 31, 2025Updated 7 months ago
- Threat Analytics Search Chrome Extension☆12Updated this week
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆14Aug 15, 2022Updated 3 years ago
- ☆16Feb 9, 2026Updated 3 weeks ago
- ☆56Updated this week
- Sys Mon! Why yu nuh logging dat?☆12Dec 10, 2018Updated 7 years ago
- pyJARM is a library for doing JARM fingerprinting using python☆50Mar 23, 2025Updated 11 months ago
- CTF Writeups☆12Feb 25, 2023Updated 3 years ago
- A script to test for subdomain takeovers from a list of domains☆12Feb 18, 2023Updated 3 years ago
- Monitoring Windows processes tool for malware analysis. Inspired by Regshot tool.☆13Jun 24, 2024Updated last year
- A tool to automate memory dump processing using Volatility, including optional Splunk integration.☆12Jul 29, 2020Updated 5 years ago
- Graphical model of a TCP/IP stack which can be used as a cheatsheet when developing BPF filters.☆16Dec 10, 2019Updated 6 years ago
- ☆12Aug 23, 2021Updated 4 years ago
- Sentinel Recon Tools Workbook☆14Aug 24, 2022Updated 3 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- A quick bash script that I created in order to speed up the creation of usable kali boxes.☆11Oct 29, 2021Updated 4 years ago