Useful resources about phishing email analysis
☆86Jan 31, 2025Updated last year
Alternatives and similar repositories for Phishing-Email-Analysis
Users that are interested in Phishing-Email-Analysis are comparing it to the libraries listed below
Sorting:
- ☆11May 30, 2021Updated 4 years ago
- SOC Interview Questions☆1,261Sep 10, 2024Updated last year
- Cobalt Strike DNS beacon parser☆11Nov 29, 2021Updated 4 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10Feb 17, 2025Updated last year
- ☆12Jun 19, 2024Updated last year
- We can Use this tool to find out sensitive data such as API keys, hardcoded credentials etc.☆24Dec 18, 2021Updated 4 years ago
- my MSTICpy practice and custom tools repository☆11Apr 23, 2025Updated 10 months ago
- Windows Internals Book 7th edition Tools☆17Apr 26, 2020Updated 5 years ago
- A dataset of phishing kits in the wild☆15Jun 1, 2024Updated last year
- Useful resources for SOC Analyst and SOC Analyst candidates.☆891Aug 28, 2023Updated 2 years ago
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 9 months ago
- Incident Response Playbooks☆15Jun 10, 2019Updated 6 years ago
- ThePhish: an automated phishing email analysis tool☆1,331Aug 1, 2024Updated last year
- KQL Detections for Microsoft Sentinel and Microsoft 365 Defender☆21Nov 15, 2024Updated last year
- VTC - Velociraptor Timeline Creator☆19May 15, 2024Updated last year
- Parses KAPE module files and downloads binaries referenced by BinaryURL☆18Oct 2, 2019Updated 6 years ago
- This repository is a comprehensive collection of resources, documentation, apps, and add-ons related to Splunk, a powerful data analytics…☆24Feb 16, 2026Updated 2 weeks ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆26Mar 3, 2023Updated 3 years ago
- IoT Digital Forensics Course with hands-on labs☆229Aug 27, 2025Updated 6 months ago
- ☆18Jan 26, 2019Updated 7 years ago
- AbuseIpDB - Wrapper around the AbuseIPDb service API☆16May 15, 2024Updated last year
- VoIP honeypot system☆21Apr 2, 2024Updated last year
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆51Apr 25, 2024Updated last year
- Website crawler with YARA detection☆89Aug 20, 2023Updated 2 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- MAL-CL (Malicious Command-Line)☆322Jan 10, 2023Updated 3 years ago
- The Office 365 Extractor is a tool that allows for complete and reliable extraction of the Unified Audit Log (UAL)☆267Feb 3, 2022Updated 4 years ago
- A collection of intelligence about Log4Shell and its exploitation activity.☆184Mar 4, 2022Updated 4 years ago
- Linux Incident Response☆90Sep 22, 2019Updated 6 years ago
- A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365☆790Oct 29, 2022Updated 3 years ago
- ☆19Jun 16, 2021Updated 4 years ago
- Sysmon Splunk App☆47Aug 21, 2018Updated 7 years ago
- Memory Forensic System on Cloud☆92Dec 21, 2023Updated 2 years ago
- gRPC client for the Merlin Server☆27Apr 17, 2025Updated 10 months ago
- ☆160Nov 26, 2023Updated 2 years ago
- ☆23Jul 7, 2023Updated 2 years ago
- cve-2021-22986 f5 rce 漏洞批量检测 poc☆27Mar 27, 2021Updated 4 years ago
- ☆51Apr 15, 2023Updated 2 years ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.