SEC599 supporting GitHub repository
☆16Sep 14, 2019Updated 6 years ago
Alternatives and similar repositories for SEC599
Users that are interested in SEC599 are comparing it to the libraries listed below
Sorting:
- Various public documents, whitepapers and articles about APT campaigns☆55Apr 1, 2016Updated 9 years ago
- Simulating Adversary Operations☆98Apr 13, 2018Updated 7 years ago
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- Registry Miner☆14Apr 10, 2018Updated 7 years ago
- OSSEC Decoder & Rulesets for Sysmon Events☆15Jul 23, 2015Updated 10 years ago
- ☆34Apr 29, 2021Updated 4 years ago
- ☆349Mar 19, 2021Updated 5 years ago
- Automated forensics written in PowerShell☆34Sep 29, 2019Updated 6 years ago
- SuperPeHasher is a wrapper for several hash algorithms dedicated to PE file.☆28Sep 16, 2021Updated 4 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Mar 1, 2019Updated 7 years ago
- InsecurePowerShell is PowerShell with some security features removed.☆104Dec 19, 2017Updated 8 years ago
- A series of GPO templates☆21Jan 2, 2017Updated 9 years ago
- Automated install scripts for Cuckoo sandbox☆38Dec 5, 2017Updated 8 years ago
- ☆30Nov 15, 2018Updated 7 years ago
- Extension to Cuckoo Sandbox open source projects, adds support to AWS cloud functionalities and enables running emulation on auto-scaling…☆135Mar 15, 2022Updated 4 years ago
- ☆13Feb 6, 2018Updated 8 years ago
- Scumblr instructions with custom search providers for monitoring malicous content☆17Nov 18, 2017Updated 8 years ago
- This repository is created to add value to existing Network Security Monitoring solutions.☆42Sep 20, 2016Updated 9 years ago
- FireEye iSIGHT Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆16Oct 12, 2018Updated 7 years ago
- ☆1,090May 1, 2019Updated 6 years ago
- Elasticsearch/Kibana environment and log data for Sigma workshop☆26Dec 20, 2019Updated 6 years ago
- FAME Automates Malware Evaluation☆931Dec 16, 2025Updated 3 months ago
- Term concordances for each course in the SANS DFIR curriculum. Used for automated index generation.☆69Aug 7, 2020Updated 5 years ago
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,174Jul 26, 2023Updated 2 years ago
- A set of Bash scripts that allows you to repeatably collect and compare baseline audit data from Linux and Windows systems☆20Oct 19, 2013Updated 12 years ago
- Site for IWS book content☆17Oct 28, 2018Updated 7 years ago
- Slides and Other Resources from my latest Talks and Presentations☆24Sep 17, 2025Updated 6 months ago
- ☆50Aug 30, 2020Updated 5 years ago
- Malware Configuration And Payload Extraction☆762Nov 22, 2024Updated last year
- An open source framework for enterprise level automated analysis.☆394Jun 27, 2022Updated 3 years ago
- Find potential Indicators of Compromise among similar Linux servers☆29Oct 28, 2017Updated 8 years ago
- Credential and Red Teaming Defense for Windows Environments☆330Jul 17, 2024Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,516Jan 12, 2026Updated 2 months ago
- An information security preparedness tool to do adversarial simulation.☆1,137Apr 1, 2019Updated 6 years ago
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 10 years ago
- Module to convert Cuckoo .json to .mist☆10Apr 8, 2020Updated 5 years ago
- How to ARM Yourself - Bsides Tampa 2020☆14Mar 1, 2020Updated 6 years ago
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Jan 30, 2018Updated 8 years ago
- A developer-friendly framework for exhaustive analysis of (PCAP and PE) files.☆15Nov 6, 2017Updated 8 years ago