PacktPublishing / Python-Digital-Forensics
Python Digital Forensics [video], published by Packt
☆20Updated last year
Related projects: ⓘ
- ☆24Updated 3 years ago
- Advanced Malware Analysis [video], published by Packt☆20Updated last year
- Mastering Malware Analysis, published by Packt☆37Updated last year
- Incident Response with Threat Intelligence, published by Packt☆49Updated 5 months ago
- Learning Python for Forensics, Second Edition, Published by Packt☆46Updated last year
- A repo to support the book☆38Updated last year
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆57Updated last year
- A MITRE ATT&CK Lookup Tool☆41Updated 4 months ago
- pcaps for Wireshark tutorial about examining Dridex infection traffic☆16Updated 3 years ago
- A sample VHDX file with multiple verbose examples of forensic and anti-forensics artifacts. Meant to be basic and can be expanded upon. P…☆25Updated last year
- Digital Forensics with Kali Linux, Second Edition, Published by Packt☆11Updated 3 years ago
- Tool used to perform threat intelligence against packet data☆34Updated 5 months ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆25Updated 8 months ago
- Three datasets to practice Threat Hunting against.☆36Updated 8 months ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Updated 5 years ago
- A simple ReST server to lookup threat actors (by name, synonym or UUID) and returning the corresponding MISP galaxy information about the…☆47Updated 9 months ago
- Hands-On Penetration Testing on Windows, published by Packt☆25Updated last year
- Digital Forensics Artifacts Knowledge Base☆71Updated 4 months ago
- ☆10Updated 3 years ago
- ☆28Updated 5 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 4 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆61Updated last year
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆110Updated last year
- Malware Analysis Techniques, published by Packt☆62Updated last year
- Cyber Threats Detection Rules☆13Updated last week
- ☆40Updated 3 years ago
- Zerofox Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆36Updated 4 years ago
- Reference sheet for Threat Hunting Professional Course☆24Updated 5 years ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆29Updated 2 months ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 3 years ago