PaloAltoNetworks / Unit42-Wireshark-tutorialsLinks
Unit 42 repository hosting packet captures (pcaps) for our series of Wireshark tutorials
☆46Updated last year
Alternatives and similar repositories for Unit42-Wireshark-tutorials
Users that are interested in Unit42-Wireshark-tutorials are comparing it to the libraries listed below
Sorting:
- pcaps of traffic for traffic analysis workshop☆89Updated 4 years ago
- MITRE Caldera™ for OT Plugins & Capabilities☆230Updated last week
- Packet captures of malicious traffic for analysis using Wireshark☆62Updated 2 years ago
- Repository resource for threat hunter☆158Updated 7 years ago
- ☆63Updated 4 years ago
- Creation of a laboratory for malware analysis in AWS☆104Updated 2 years ago
- Malware Analysis Techniques, published by Packt☆77Updated 2 years ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆338Updated 2 weeks ago
- Repo Filled With Follow Along Guides☆80Updated 3 years ago
- ☆52Updated 2 years ago
- A cli script to analyze an E-Mail in the EML format for viewing the header, extracting attachments, etc.☆111Updated 2 years ago
- Indicators of Compromise☆233Updated last week
- ☆55Updated 3 weeks ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆163Updated 3 years ago
- Practical Windows Forensics Training☆699Updated last year
- Consolidation of various resources related to Microsoft Sysmon & sample data/log☆119Updated 4 years ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆168Updated last year
- SIEM Cheat Sheet☆76Updated 2 years ago
- Tools for simulating threats☆197Updated 2 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆107Updated 2 years ago
- CLI tools for forensic investigation of Windows artifacts☆347Updated 4 months ago
- Hands-On Network Forensics by Nipun Jaswal☆59Updated 2 years ago
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆41Updated 4 years ago
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆58Updated last year
- Fast IOC and YARA Scanner☆84Updated 5 years ago
- Incident Response collection and processing scripts with automated reporting scripts☆314Updated last year
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆83Updated 3 years ago
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆31Updated last year
- Jupyter Notebooks for the Blue Team☆148Updated 8 months ago
- Zeek Log Cheatsheets☆298Updated 3 months ago