PaloAltoNetworks / Unit42-Wireshark-tutorials
Unit 42 repository hosting packet captures (pcaps) for our series of Wireshark tutorials
☆35Updated 9 months ago
Related projects ⓘ
Alternatives and complementary repositories for Unit42-Wireshark-tutorials
- pcaps of traffic for traffic analysis workshop☆78Updated 3 years ago
- Packet captures of malicious traffic for analysis using Wireshark☆54Updated last year
- ☆44Updated 6 years ago
- ☆18Updated 7 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆93Updated 3 years ago
- A cli script to analyze an E-Mail in the EML format for viewing the header, extracting attachments, etc.☆94Updated last year
- Blue Team detection lab created with Terraform and Ansible in Azure.☆143Updated this week
- ☆47Updated this week
- Open Threat Hunting Framework☆103Updated last year
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆73Updated 2 weeks ago
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆146Updated this week
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆39Updated 7 months ago
- Repo Filled With Follow Along Guides☆71Updated 2 years ago
- Linux Evidence Acquisition Framework☆113Updated last month
- Cyber Threat Intelligence Data, Indicators, and Analysis☆74Updated last month
- ☆42Updated last year
- Fast IOC and YARA Scanner☆74Updated 4 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆104Updated 2 years ago
- ☆66Updated 3 months ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆61Updated 2 years ago
- ☆50Updated last year
- ☆54Updated 3 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated 5 months ago
- Signatures and IoCs from public Volexity blog posts.☆322Updated last week
- MISP Playbooks☆174Updated last month
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆137Updated last year
- ☆85Updated this week
- Open IOC sharing platform☆53Updated 2 weeks ago
- Repository of tools and resources for analyzing Docker containers☆59Updated last year