LetsDefend / Phishing-Email-AnalysisLinks
Useful resources about phishing email analysis
☆87Updated 10 months ago
Alternatives and similar repositories for Phishing-Email-Analysis
Users that are interested in Phishing-Email-Analysis are comparing it to the libraries listed below
Sorting:
- SIEM Cheat Sheet☆77Updated 2 years ago
- Repository resource for threat hunter☆158Updated 7 years ago
- Some Threat Hunting queries useful for blue teamers☆130Updated 3 years ago
- Some important DFIR Resources☆84Updated 2 years ago
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆110Updated last year
- ☆106Updated 4 years ago
- ☆189Updated last year
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆83Updated 3 years ago
- ☆67Updated 2 months ago
- ☆20Updated 6 years ago
- ☆13Updated 2 years ago
- ☆34Updated 2 years ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆191Updated 11 months ago
- Cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for them☆29Updated last year
- ☆39Updated 2 years ago
- The Threat Actor Profile Guide for CTI Analysts☆115Updated 2 years ago
- ☆57Updated last month
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆63Updated 2 years ago
- Pwnspoof repository☆265Updated 2 years ago
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆125Updated 2 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆106Updated 2 years ago
- This is a repository for network security tools and technologies.☆100Updated 3 years ago
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆41Updated 4 years ago
- A runbook for handling security incidents in cooperation with 0xsyr0☆52Updated 3 years ago
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆118Updated 6 months ago
- ☆133Updated 2 years ago
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆137Updated 2 years ago
- MISP Playbooks☆219Updated last month
- Security Operation Center Lab☆21Updated last year
- Creation of a laboratory for malware analysis in AWS☆104Updated 3 years ago