PacktPublishing / Python-Digital-ForensicsLinks
Python Digital Forensics [video], published by Packt
☆20Updated 2 years ago
Alternatives and similar repositories for Python-Digital-Forensics
Users that are interested in Python-Digital-Forensics are comparing it to the libraries listed below
Sorting:
- Learning Python for Forensics, Second Edition, Published by Packt☆47Updated 2 years ago
- Advanced Malware Analysis [video], published by Packt☆21Updated 2 years ago
- Mastering Malware Analysis, published by Packt☆39Updated 2 years ago
- ☆23Updated 4 years ago
- Python Digital Forensics Cookbook, published by Packt☆102Updated 2 years ago
- Tool used to perform threat intelligence against packet data☆35Updated 5 months ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆23Updated 8 years ago
- FIles and guides related to using Elasticstack as a SIEM☆12Updated 5 years ago
- Hands-On Penetration Testing on Windows, published by Packt☆25Updated 2 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- Threathunt details for the Solarwinds compromise☆33Updated 4 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆27Updated 4 years ago
- Reference sheet for Threat Hunting Professional Course☆25Updated 6 years ago
- Script that checks for available updates for the most commonly used Digital Forensics tools☆59Updated 4 years ago
- A simple ReST server to lookup threat actors (by name, synonym or UUID) and returning the corresponding MISP galaxy information about the…☆48Updated last year
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆65Updated 2 years ago
- A repo to support the book☆43Updated 2 years ago
- pcaps for Wireshark tutorial about examining Dridex infection traffic☆17Updated 4 years ago
- Learning Python for Forensics by Packt Publishing☆120Updated 2 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Updated 6 years ago
- ☆39Updated 4 years ago
- ☆11Updated 4 years ago
- Mapping your datasources and detections to the MITRE ATT&CK Navigator framework.☆58Updated 5 years ago
- Binary Analysis Cookbook, published by Packt☆42Updated 2 years ago
- Sharing Threat Hunting runbooks☆26Updated 6 years ago
- ☆19Updated 3 months ago
- The pattern matching swiss knife☆10Updated 4 years ago
- ☆23Updated 5 years ago
- ☆89Updated last week
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago