SecurityNik / SUWtHEh-View external linksLinks
Learning by Practising - Hack & Detect - A Practical Guide to Hacking and its Detection via network forensics
☆77Aug 28, 2023Updated 2 years ago
Alternatives and similar repositories for SUWtHEh-
Users that are interested in SUWtHEh- are comparing it to the libraries listed below
Sorting:
- Tool used to perform threat intelligence against packet data☆36Jan 26, 2025Updated last year
- Windows Thingies... but in Rust☆23Nov 12, 2022Updated 3 years ago
- PowerShell Script to facilitate the processing of SRUM data for on-the-fly forensics and if needed threat hunting☆23Oct 26, 2019Updated 6 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆41Jan 2, 2018Updated 8 years ago
- InvestigationPlaybookSpec☆71Sep 26, 2017Updated 8 years ago
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- Transform EQL detection rules to VQL artifacts☆12Nov 12, 2021Updated 4 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Security R package with a set of utils to analyse the different industry standards (MITRE and NIST).☆12May 27, 2019Updated 6 years ago
- Proof of concept implementation of a cyber threat intelligence and incident handling platform☆11Feb 10, 2023Updated 3 years ago
- The method and files used to generate Sysmon event logs, push them to a remote Splunk, and ingest/normalize the data for analysis.☆10Sep 28, 2020Updated 5 years ago
- Oriana is a threat hunting tool that leverages a subset of Windows events to build relationships, calculate totals and run analytics. The…☆177Jun 10, 2021Updated 4 years ago
- Scripts for TheHive.☆23Nov 15, 2019Updated 6 years ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆111Feb 6, 2020Updated 6 years ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆148Feb 1, 2026Updated 2 weeks ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆342Dec 3, 2025Updated 2 months ago
- Configuration Extractor for BlackCat Ransomware☆31Mar 18, 2022Updated 3 years ago
- Plugins for the Viper Framework☆14Sep 21, 2019Updated 6 years ago
- English subtitles for the TV series "Hackad"☆11May 18, 2023Updated 2 years ago
- Sechead is a powerful security tool developed in Python that allows users to audit the security headers of any website. With Sechead, use…☆13May 22, 2023Updated 2 years ago
- Matt's DFIR blog☆14Jul 28, 2025Updated 6 months ago
- ☆12Nov 25, 2020Updated 5 years ago
- Scripts and tools created for appx analysis talk (Magnet summit 2019)☆19Feb 26, 2024Updated last year
- small IR scripts for orgs using G Suite☆18Feb 27, 2019Updated 6 years ago
- Jupyter notebooks for threat hunting☆60Mar 26, 2025Updated 10 months ago
- A Splunk Technology Add-on to forward filtered ETW events.☆30Oct 14, 2020Updated 5 years ago
- Flame - Send vulnerabilities reports to SIEM☆15Jul 28, 2016Updated 9 years ago
- File Capability Extractor☆14Jul 12, 2025Updated 7 months ago
- ☆14Oct 22, 2021Updated 4 years ago
- Dockerfiles for containerized osquery☆14May 23, 2017Updated 8 years ago
- My Jupyter Notebooks☆36Mar 14, 2025Updated 11 months ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Jan 1, 2020Updated 6 years ago
- ☆99Nov 10, 2021Updated 4 years ago
- Simple and efficient file shredding☆14Sep 23, 2019Updated 6 years ago
- Remotely collect linux live forensics artifacts.☆14Jul 8, 2022Updated 3 years ago
- ☆16Jan 18, 2020Updated 6 years ago
- Just Another broken Registry Parser (JARP)☆16May 23, 2024Updated last year
- Generic Signature Format for SIEM Systems☆18Jul 25, 2023Updated 2 years ago