RAB301000001C3 / PCAPEXTRACT
Packet Analysis on Steroids
☆10Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for PCAPEXTRACT
- Linux Baseline and Forensic Triage Tool - BETA☆50Updated 2 years ago
- ☆34Updated 8 months ago
- Contains compiled binaries of Volatility☆29Updated 3 weeks ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 6 months ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- ☆19Updated last year
- Repository where I hold random detection and threat hunting queries that I come up with based on different sources of information (or eve…☆36Updated this week
- create a "simulated internet" cyber range environment☆13Updated last month
- ☆41Updated 2 years ago
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆46Updated 3 weeks ago
- The ultimate solution for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆22Updated 2 months ago
- ☆43Updated 3 weeks ago
- ☆29Updated last year
- A tool to display Windows Event logs as they happen.☆12Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆50Updated last year
- ☆70Updated 2 weeks ago
- A project that aims to automate Volatility3 at scale with the use of cloud strength and the power of KQL inside ADX.☆15Updated 2 weeks ago
- Random tips and tricks RE: ransomware☆14Updated 3 years ago
- ☆23Updated last year
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆41Updated 2 years ago
- ☆16Updated last year
- Tools and scripts to deploy and manage OpenRelik instances☆10Updated 2 weeks ago
- Jupyter Notebooks for the Blue Team☆31Updated last year
- A full analysis report detailing as much as possible of a Malware or a Threat☆24Updated 4 months ago
- MS Graph Commands and Tools for Blue Teamers☆48Updated 11 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆60Updated 3 months ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆25Updated 3 weeks ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆49Updated 5 months ago
- Contains Actual Events and Codes of Threat Groups, APTs, Research Groups☆19Updated 2 years ago
- An exercise to practice deobfuscating PowerShell Scripts.☆28Updated last year