PacktPublishing / Incident-Response-with-Threat-IntelligenceView external linksLinks
Incident Response with Threat Intelligence, published by Packt
☆57Apr 18, 2024Updated last year
Alternatives and similar repositories for Incident-Response-with-Threat-Intelligence
Users that are interested in Incident-Response-with-Threat-Intelligence are comparing it to the libraries listed below
Sorting:
- ☆44Jul 11, 2025Updated 7 months ago
- ☆22Jun 2, 2023Updated 2 years ago
- ☆13Jun 14, 2023Updated 2 years ago
- Purple Team Strategies, Published by Packt☆14Jan 30, 2023Updated 3 years ago
- macos-collector - Automated Collection of macOS Forensic Artifacts for DFIR☆29Jan 29, 2026Updated 2 weeks ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆13Nov 29, 2023Updated 2 years ago
- ☆12Dec 7, 2022Updated 3 years ago
- Microsoft 365 Defender Hunting via PowerShell.☆14Feb 8, 2022Updated 4 years ago
- A simple way of detecting multithreaded exfiltration in Zeek.☆15May 1, 2025Updated 9 months ago
- Windows Security Logging☆43Jul 17, 2022Updated 3 years ago
- Automation with Ansible Playbooks by Packt Publishing☆14Jan 24, 2023Updated 3 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆21Jul 4, 2023Updated 2 years ago
- Incident Response Report Using GitHub-Sphinx☆20Oct 28, 2019Updated 6 years ago
- This is a repository for network security tools and technologies.☆101Nov 6, 2022Updated 3 years ago
- Procmonel is Procmon like monitoring system implemented using Microsoft WDK☆12Dec 25, 2019Updated 6 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Feb 3, 2022Updated 4 years ago
- A repo to support the book☆46Jan 18, 2023Updated 3 years ago
- Library of threat hunts to get any user started!☆48Sep 4, 2020Updated 5 years ago
- petit "playbook" qui pourrait servir de base à une réponse à incident lors d'une attaque de type ransomware☆21Aug 30, 2022Updated 3 years ago
- A Golang implant that uses Slack as a command and control server☆47Jun 10, 2020Updated 5 years ago
- Slides of my public talks☆56Dec 13, 2023Updated 2 years ago
- ☆58Dec 8, 2025Updated 2 months ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Aug 11, 2021Updated 4 years ago
- ☆44Aug 3, 2021Updated 4 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Mar 1, 2023Updated 2 years ago
- This is a collection of Security Baselines that I use in my virtual lab environment.☆22Mar 11, 2020Updated 5 years ago
- A library that scrapes Linkedin for user data☆24May 12, 2021Updated 4 years ago
- Enterprise Augmented Reality Projects, published by Packt☆24Jan 30, 2023Updated 3 years ago
- WTL helper library☆56Jan 15, 2026Updated last month
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆27Jul 13, 2022Updated 3 years ago
- ☆96May 5, 2025Updated 9 months ago
- Mastering Service Mesh, published by Packt☆21Jan 30, 2023Updated 3 years ago
- A repository dedicated to tracking ransomware families based on leaked builders.☆22Apr 17, 2024Updated last year
- Virus Total Free - IOC parser and report generator☆25Mar 19, 2023Updated 2 years ago
- This Repository gives the best and possible strategies against hunting the ransomware☆26Aug 23, 2022Updated 3 years ago
- My Malware Blog☆21Feb 4, 2024Updated 2 years ago
- NTFS samples☆27Aug 1, 2020Updated 5 years ago
- SuperPeHasher is a wrapper for several hash algorithms dedicated to PE file.☆28Sep 16, 2021Updated 4 years ago
- Identify the attack paths in BloodHound breaking your AD tiering☆326Nov 6, 2022Updated 3 years ago