Repo to track SANS BlueTeam Summit Presentation
☆23Oct 4, 2022Updated 3 years ago
Alternatives and similar repositories for SANS-BlueTeamSummit-2022
Users that are interested in SANS-BlueTeamSummit-2022 are comparing it to the libraries listed below
Sorting:
- TAXII 2.0 Server implemented in Node JS with MongoDB backend☆12Jan 3, 2023Updated 3 years ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆14Aug 15, 2022Updated 3 years ago
- ☆28May 25, 2021Updated 4 years ago
- Critical Remote Code Execution Vulnerability (CVE-2018-11776) Found in Apache Struts.☆15Jul 30, 2020Updated 5 years ago
- D-Scan project for office document analysis and generating flow diagram of macro in documents. For demo visit☆29Jan 10, 2026Updated last month
- A library that scrapes Linkedin for user data☆24May 12, 2021Updated 4 years ago
- scripting IDA like a Pro☆24Oct 27, 2020Updated 5 years ago
- ☆22Jun 2, 2023Updated 2 years ago
- 2021 SANS DFIR Summit: Greppin' Logs☆20Oct 30, 2025Updated 4 months ago
- Script to automate Linux live evidence collection☆28Aug 4, 2022Updated 3 years ago
- Repository with examples of how to solve a tsp with pso, aco, ga and integer programming☆10Oct 9, 2024Updated last year
- Performs method enumeration and interrogation against flash remoting end points.☆38Aug 7, 2020Updated 5 years ago
- Small project to facilitate creation of .lnk payloads☆80Nov 18, 2022Updated 3 years ago
- App for storing FireHOL feeds (https://github.com/firehol/blocklist-ipsets) with a history of adding and removing each address☆35Jan 4, 2023Updated 3 years ago
- 一款记录任务时间的时间管理应用☆17Feb 27, 2026Updated last week
- un sensor pour récupérer les informations des prochaines marées☆12Jan 27, 2026Updated last month
- Offline amnesic live Linux distribution☆14Mar 8, 2025Updated last year
- A DFVFS Backed Forensic Viewer☆42Apr 13, 2020Updated 5 years ago
- Library for extracting fields from Sigtran TCAP/INAP messages☆11Feb 17, 2026Updated 2 weeks ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- The simulator for the Next-Generation Championship in Branch Prediction (CBP-NG)☆27Updated this week
- Python based modular control simulation kickass toolbox☆11Sep 30, 2025Updated 5 months ago
- Exploiting: CVE-2021-41349☆11Jan 6, 2022Updated 4 years ago
- Terraform Script for - Storage, container and data life cycle rules creation at scale☆11Jan 10, 2023Updated 3 years ago
- A wrapper around Windows, calls explicitly the lowest possible calls☆14Jan 19, 2023Updated 3 years ago
- A KEDA external scaler for the Durable Task Azure Storage backend.☆10Updated this week
- Kismet website generation & documentation data☆12Feb 7, 2026Updated last month
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆97May 28, 2023Updated 2 years ago
- Yara sort☆13Updated this week
- Companion Worm research☆16Nov 8, 2021Updated 4 years ago
- HTTP Brute Forcer (Java replacement for SP's CrowBar).☆12Apr 20, 2017Updated 8 years ago
- ⚛️ Pikaso React Hook☆11Jul 25, 2022Updated 3 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Apr 30, 2021Updated 4 years ago
- A simple application that shows how to exploit the CVE-2022-42889 vulnerability☆10Nov 6, 2022Updated 3 years ago
- ☆11Dec 17, 2024Updated last year
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆21May 17, 2023Updated 2 years ago
- The Beamline streaming process mining framework☆14Oct 5, 2023Updated 2 years ago
- Common template for pytorch project. Easy to extent and modify for new project.☆13Dec 13, 2022Updated 3 years ago