Repo to track SANS BlueTeam Summit Presentation
☆23Oct 4, 2022Updated 3 years ago
Alternatives and similar repositories for SANS-BlueTeamSummit-2022
Users that are interested in SANS-BlueTeamSummit-2022 are comparing it to the libraries listed below
Sorting:
- TAXII 2.0 Server implemented in Node JS with MongoDB backend☆12Jan 3, 2023Updated 3 years ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆14Aug 15, 2022Updated 3 years ago
- Critical Remote Code Execution Vulnerability (CVE-2018-11776) Found in Apache Struts.☆15Jul 30, 2020Updated 5 years ago
- D-Scan project for office document analysis and generating flow diagram of macro in documents. For demo visit☆29Jan 10, 2026Updated 2 months ago
- scripting IDA like a Pro☆24Oct 27, 2020Updated 5 years ago
- ☆22Jun 2, 2023Updated 2 years ago
- Script to automate Linux live evidence collection☆28Aug 4, 2022Updated 3 years ago
- Migrate team-managed project issues between two JIRA Cloud accounts☆12Nov 12, 2024Updated last year
- Presentation Slides and Video links☆32Nov 8, 2021Updated 4 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆38Aug 7, 2020Updated 5 years ago
- App for storing FireHOL feeds (https://github.com/firehol/blocklist-ipsets) with a history of adding and removing each address☆35Jan 4, 2023Updated 3 years ago
- Offline amnesic live Linux distribution☆14Mar 8, 2025Updated last year
- 一款记录任务时间的时间管理应用☆17Feb 27, 2026Updated last week
- un sensor pour récupérer les informations des prochaines marées☆12Jan 27, 2026Updated last month
- A DFVFS Backed Forensic Viewer☆42Apr 13, 2020Updated 5 years ago
- A KEDA external scaler for the Durable Task Azure Storage backend.☆10Updated this week
- Python based modular control simulation kickass toolbox☆11Sep 30, 2025Updated 5 months ago
- Library for extracting fields from Sigtran TCAP/INAP messages☆11Feb 17, 2026Updated 3 weeks ago
- A wrapper around Windows, calls explicitly the lowest possible calls☆14Jan 19, 2023Updated 3 years ago
- Terraform Script for - Storage, container and data life cycle rules creation at scale☆11Jan 10, 2023Updated 3 years ago
- Exploiting: CVE-2021-41349☆11Jan 6, 2022Updated 4 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- Kismet website generation & documentation data☆12Feb 7, 2026Updated last month
- The simulator for the Next-Generation Championship in Branch Prediction (CBP-NG)☆27Mar 3, 2026Updated last week
- ☆11Updated this week
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆97May 28, 2023Updated 2 years ago
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- Companion Worm research☆16Nov 8, 2021Updated 4 years ago
- A Sigma based detection pipeline☆12Dec 15, 2023Updated 2 years ago
- ☆11Dec 17, 2024Updated last year
- A python RCE exploit on QNAP-QTS☆14Sep 15, 2020Updated 5 years ago
- ⚛️ Pikaso React Hook☆11Jul 25, 2022Updated 3 years ago
- [MIRROR] OpenWrt firmware image utilities☆16Updated this week
- ☆12Aug 5, 2021Updated 4 years ago
- Are you able to use open source intelligence to solve this challenge?☆11Apr 14, 2019Updated 6 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Jun 11, 2025Updated 8 months ago
- Adapts a Monday board to Power BI☆12Feb 14, 2026Updated 3 weeks ago
- Project to Support The Hunter's Framework (THF)☆11Apr 16, 2024Updated last year