LearningKijo / SecurityResearcher-Note
Cover various security approaches to attack techniques and also provides new discoveries about security breaches.
☆475Updated 3 weeks ago
Alternatives and similar repositories for SecurityResearcher-Note:
Users that are interested in SecurityResearcher-Note are comparing it to the libraries listed below
- This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation inc…☆646Updated 2 weeks ago
- A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as …☆391Updated 4 months ago
- PowerShell tools to help defenders hunt smarter, hunt harder.☆364Updated 3 weeks ago
- This repo is about Active Directory Advanced Threat Hunting☆618Updated 2 months ago
- Awesome Security lists for SOC/CERT/CTI☆954Updated this week
- ☆474Updated 2 weeks ago
- ☆342Updated 2 years ago
- PowerShell Digital Forensics & Incident Response Scripts.☆597Updated last month
- Awesome list of keywords and artifacts for Threat Hunting sessions☆566Updated 2 weeks ago
- Practical Windows Forensics Training☆663Updated last year
- A curated list of tools for incident response. With repository stars⭐ and forks🍴☆227Updated 3 weeks ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆662Updated this week
- A resource containing all the tools each ransomware gangs uses☆1,021Updated this week
- Playbooks for SOC Analysts☆501Updated 2 years ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆636Updated 11 months ago
- ☆806Updated last year
- ☆686Updated 2 months ago
- ☆175Updated last year
- Useful resources for SOC Analyst and SOC Analyst candidates.☆740Updated last year
- A RedTeam Toolkit☆397Updated last month
- Content and collateral for the Microsoft Sentinel SOC 101 series☆180Updated last year
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆565Updated 6 months ago
- A tool matrix for Russian APTs based on the Ransomware Tool Matrix☆207Updated 5 months ago
- Collection of forensic tools☆622Updated last week
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.☆298Updated last week
- CLI tools for forensic investigation of Windows artifacts☆327Updated 6 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆120Updated last year
- This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.☆284Updated 2 years ago
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆398Updated last year
- A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat in…☆295Updated this week