LearningKijo / SecurityResearcher-NoteLinks
Cover various security approaches to attack techniques and also provides new discoveries about security breaches.
☆481Updated 6 months ago
Alternatives and similar repositories for SecurityResearcher-Note
Users that are interested in SecurityResearcher-Note are comparing it to the libraries listed below
Sorting:
- This repo is about Active Directory Advanced Threat Hunting☆630Updated 8 months ago
- PowerShell tools to help defenders hunt smarter, hunt harder.☆444Updated 2 weeks ago
- A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as …☆414Updated 3 months ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆717Updated 3 months ago
- CLI tools for forensic investigation of Windows artifacts☆347Updated 3 months ago
- Practical Windows Forensics Training☆693Updated last year
- Awesome list of keywords and artifacts for Threat Hunting sessions☆614Updated 3 months ago
- DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital For…☆380Updated 3 months ago
- ☆187Updated last year
- ☆165Updated 2 years ago
- PowerShell Digital Forensics & Incident Response Scripts.☆713Updated last month
- This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation inc…☆762Updated last week
- Repository where I hold random detection and threat hunting queries that I come up with based on different sources of information (or eve…☆265Updated 2 weeks ago
- Map tracking ransomware, by OCD World Watch team☆477Updated 8 months ago
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆402Updated last year
- Playbooks for SOC Analysts☆620Updated 2 years ago
- This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.