PaloAltoNetworks / Unit42-Wireshark-tutorialsLinks
Unit 42 repository hosting packet captures (pcaps) for our series of Wireshark tutorials
☆46Updated last year
Alternatives and similar repositories for Unit42-Wireshark-tutorials
Users that are interested in Unit42-Wireshark-tutorials are comparing it to the libraries listed below
Sorting:
- pcaps of traffic for traffic analysis workshop☆88Updated 4 years ago
- Packet captures of malicious traffic for analysis using Wireshark☆62Updated 2 years ago
- Repository resource for threat hunter☆158Updated 7 years ago
- MITRE Caldera™ for OT Plugins & Capabilities☆227Updated 2 months ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆168Updated 11 months ago
- Creation of a laboratory for malware analysis in AWS☆104Updated 2 years ago
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆55Updated last year
- Consolidation of various resources related to Microsoft Sysmon & sample data/log☆117Updated 4 years ago
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆122Updated 2 years ago
- Pwnspoof repository☆264Updated 2 years ago
- Incident Response collection and processing scripts with automated reporting scripts☆312Updated last year
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆335Updated 2 weeks ago
- ☆63Updated 4 years ago
- Signatures and IoCs from public Volexity blog posts.☆359Updated 3 weeks ago
- Tools for simulating threats☆193Updated 2 years ago
- Practical Windows Forensics Training☆694Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆405Updated last month
- A cli script to analyze an E-Mail in the EML format for viewing the header, extracting attachments, etc.☆110Updated 2 years ago
- Indicators of Compromise (IOCs) from malware or suspicious network traffic☆89Updated 2 weeks ago
- Zeek Log Cheatsheets☆297Updated 2 months ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆163Updated 3 years ago
- Fast IOC and YARA Scanner☆84Updated 5 years ago
- Repo Filled With Follow Along Guides☆79Updated 3 years ago
- Indicators of Compromise☆227Updated last week
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆199Updated last year
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆118Updated 5 months ago
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆40Updated 4 years ago
- ☆60Updated this week
- Docker image for Velocidex Velociraptor☆139Updated 7 months ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆107Updated 2 years ago