PaloAltoNetworks / Unit42-Wireshark-tutorialsLinks
Unit 42 repository hosting packet captures (pcaps) for our series of Wireshark tutorials
☆47Updated 2 years ago
Alternatives and similar repositories for Unit42-Wireshark-tutorials
Users that are interested in Unit42-Wireshark-tutorials are comparing it to the libraries listed below
Sorting:
- pcaps of traffic for traffic analysis workshop☆91Updated 4 years ago
- Packet captures of malicious traffic for analysis using Wireshark☆64Updated 2 years ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆175Updated last year
- A production ready Dockered MISP☆309Updated last week
- Pwnspoof repository☆264Updated 2 years ago
- Hands-On Network Forensics by Nipun Jaswal☆62Updated 2 years ago
- ☆54Updated 2 years ago
- Indicators of Compromise☆247Updated last week
- Incident Response collection and processing scripts with automated reporting scripts☆319Updated last year
- Tools for simulating threats☆199Updated 2 years ago
- A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat in…☆441Updated this week
- Zeek Log Cheatsheets☆301Updated 5 months ago
- Practical Windows Forensics Training☆710Updated last year
- Repository resource for threat hunter☆158Updated 7 years ago
- Repo Filled With Follow Along Guides☆80Updated 3 years ago
- Fast IOC and YARA Scanner☆88Updated 5 years ago
- Signatures and IoCs from public Volexity blog posts.☆362Updated last month
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆342Updated last month
- Threat Hunting with Elastic Stack, Published by Packt☆39Updated 3 years ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆164Updated 3 years ago
- A cli script to analyze an E-Mail in the EML format for viewing the header, extracting attachments, etc.☆113Updated 2 years ago
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆60Updated last year
- Indicators of Compromise (IOCs) from malware or suspicious network traffic☆119Updated 2 months ago
- MITRE Caldera™ for OT Plugins & Capabilities☆232Updated last month
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆41Updated 4 years ago
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆212Updated this week
- CLI tools for forensic investigation of Windows artifacts☆349Updated 6 months ago
- DShield Sensor Log Collection with ELK☆44Updated this week
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆85Updated 3 years ago
- ☆64Updated 4 years ago