LearningKijo / SecurityResearcher-NoteLinks
Cover various security approaches to attack techniques and also provides new discoveries about security breaches.
☆487Updated 9 months ago
Alternatives and similar repositories for SecurityResearcher-Note
Users that are interested in SecurityResearcher-Note are comparing it to the libraries listed below
Sorting:
- This repo is about Active Directory Advanced Threat Hunting☆648Updated 11 months ago
- PowerShell tools to help defenders hunt smarter, hunt harder.☆453Updated 3 months ago
- A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as …☆420Updated 5 months ago
- Practical Windows Forensics Training☆714Updated last year
- ☆192Updated last year
- CLI tools for forensic investigation of Windows artifacts☆349Updated 6 months ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆631Updated 6 months ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆723Updated 5 months ago
- PowerShell Digital Forensics & Incident Response Scripts.☆761Updated 3 weeks ago
- A tool matrix for Russian APTs based on the Ransomware Tool Matrix☆224Updated 5 months ago
- Repository where I hold random detection and threat hunting queries that I come up with based on different sources of information (or eve…☆276Updated last month
- DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital For…☆416Updated 2 months ago
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆408Updated 2 years ago
- Advanced Bash script designed for conducting digital forensics on Linux systems☆144Updated last year
- A curated list of tools for incident response. With repository stars⭐ and forks🍴☆256Updated this week
- This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.☆334Updated 2 years ago
- Map tracking ransomware, by OCD World Watch team☆483Updated 2 weeks ago
- ☆173Updated 2 years ago
- Playbooks for SOC Analysts☆666Updated 3 years ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆124Updated 2 years ago
- CTF styled Digital Forensics labs, as offered in FAST NUCES Karachi during Spring 2023.☆319Updated 2 years ago
- Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!☆458Updated last year
- Content and collateral for the Microsoft Sentinel SOC 101 series☆204Updated last year
- KQL Queries. Microsoft Defender, Microsoft Sentinel☆818Updated last week
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆674Updated last year
- A resource containing all the tools each ransomware gangs uses☆1,322Updated last month
- Useful resources for SOC Analyst and SOC Analyst candidates.☆878Updated 2 years ago
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,035Updated 3 weeks ago
- Repository for SOC analysts, queries to investigate, advanced hunting, sites for analysis, malware samples, courses to improve skills, IO…☆89Updated 6 months ago
- A repository of KQL queries focused on threat hunting and threat detecting for Microsoft Sentinel & Microsoft XDR (Former Microsoft 365 D…☆752Updated 5 months ago