PaloAltoNetworks / Unit42-Wireshark-tutorialsLinks
Unit 42 repository hosting packet captures (pcaps) for our series of Wireshark tutorials
☆46Updated last year
Alternatives and similar repositories for Unit42-Wireshark-tutorials
Users that are interested in Unit42-Wireshark-tutorials are comparing it to the libraries listed below
Sorting:
- pcaps of traffic for traffic analysis workshop☆88Updated 4 years ago
- Packet captures of malicious traffic for analysis using Wireshark☆61Updated 2 years ago
- Repository resource for threat hunter☆158Updated 7 years ago
- Creation of a laboratory for malware analysis in AWS☆104Updated 2 years ago
- Incident Response collection and processing scripts with automated reporting scripts☆311Updated last year
- Indicators of Compromise (IOCs) from malware or suspicious network traffic☆78Updated last week
- A cli script to analyze an E-Mail in the EML format for viewing the header, extracting attachments, etc.☆110Updated 2 years ago
- Indicators of Compromise☆221Updated this week
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆332Updated 5 months ago
- DShield Sensor Log Collection with ELK☆41Updated 2 weeks ago
- MITRE Caldera™ for OT Plugins & Capabilities☆225Updated 2 months ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆163Updated 10 months ago
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆121Updated 2 years ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆163Updated 3 years ago
- Repo Filled With Follow Along Guides☆79Updated 3 years ago
- CLI tools for forensic investigation of Windows artifacts☆347Updated 2 months ago
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆53Updated last year
- Fast IOC and YARA Scanner☆83Updated 5 years ago
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆201Updated this week
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆144Updated last week
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆404Updated 4 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆391Updated 2 weeks ago
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆30Updated last year
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆106Updated 2 years ago
- Rapidly Search and Hunt through Linux Forensics Artifacts☆200Updated last year
- Tools for simulating threats☆193Updated last year
- MISP Playbooks☆211Updated 3 months ago
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆197Updated last year
- ☆185Updated last year
- A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat in…☆376Updated last week