Useful resources about phishing email analysis
☆86Jan 31, 2025Updated last year
Alternatives and similar repositories for Phishing-Email-Analysis
Users that are interested in Phishing-Email-Analysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆42Mar 6, 2023Updated 3 years ago
- SOC Interview Questions☆1,273Sep 10, 2024Updated last year
- Useful resources for SOC Analyst and SOC Analyst candidates.☆906Aug 28, 2023Updated 2 years ago
- ☆195Mar 11, 2024Updated 2 years ago
- This repository is a comprehensive collection of resources, documentation, apps, and add-ons related to Splunk, a powerful data analytics…☆24Feb 16, 2026Updated last month
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- An Installation Script for Bro IDS on Debian Based Systems☆20Jun 25, 2020Updated 5 years ago
- endlessh auto reporting IPs to abuseipdb.com☆16Jan 15, 2025Updated last year
- KQL Detections for Microsoft Sentinel and Microsoft 365 Defender☆21Nov 15, 2024Updated last year
- my MSTICpy practice and custom tools repository☆11Apr 23, 2025Updated 11 months ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10Feb 17, 2025Updated last year
- Zeek Log Cheatsheets☆304Aug 12, 2025Updated 7 months ago
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆72Apr 3, 2024Updated last year
- Cobalt Strike DNS beacon parser☆11Nov 29, 2021Updated 4 years ago
- IoT Digital Forensics Course with hands-on labs☆229Aug 27, 2025Updated 6 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Windows Internals Book 7th edition Tools☆17Apr 26, 2020Updated 5 years ago
- A dataset of phishing kits in the wild☆15Jun 1, 2024Updated last year
- Parses KAPE module files and downloads binaries referenced by BinaryURL☆18Oct 2, 2019Updated 6 years ago
- ☆14Jun 19, 2024Updated last year
- ☆29Aug 21, 2024Updated last year
- ☆14Mar 10, 2026Updated 2 weeks ago
- Volatility plugin to search for all Autostart Extensibility Points (AESPs)☆10May 16, 2024Updated last year
- Three datasets to practice Threat Hunting against.☆46Jan 3, 2024Updated 2 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Contains compiled binaries of Volatility☆36May 18, 2025Updated 10 months ago
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 10 months ago
- ☆51Apr 15, 2023Updated 2 years ago
- ☆160Nov 26, 2023Updated 2 years ago
- ☆112May 30, 2021Updated 4 years ago
- A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365☆790Oct 29, 2022Updated 3 years ago
- A collection of intelligence about Log4Shell and its exploitation activity.☆184Mar 4, 2022Updated 4 years ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆29Sep 29, 2025Updated 5 months ago
- A sample VHDX file with multiple verbose examples of forensic and anti-forensics artifacts. Meant to be basic and can be expanded upon. P…☆27Jan 2, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆19Jun 16, 2021Updated 4 years ago
- ☆27Dec 20, 2021Updated 4 years ago
- This is a public repository to help those trying to learn Azure content and certifications to better understand the concepts and have a c…☆32Sep 28, 2023Updated 2 years ago
- A free cybersecurity study plan to build a cybersecurity career.☆43Mar 6, 2025Updated last year
- Our Friendly Gmail will act as Server and implant will exfiltrate data via smtp and will read commands from C2 (Gmail) via imap protocol☆263Sep 26, 2025Updated 6 months ago
- Oracle WebLogic CVE-2022-21371☆19Aug 31, 2022Updated 3 years ago
- VTC - Velociraptor Timeline Creator☆19May 15, 2024Updated last year