SecurityNik / SUWtHEh-
Learning by Practising - Hack & Detect - A Practical Guide to Hacking and its Detection via network forensics
☆78Updated last year
Alternatives and similar repositories for SUWtHEh-:
Users that are interested in SUWtHEh- are comparing it to the libraries listed below
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- ☆58Updated 2 years ago
- Cloud Templates and scripts to deploy mordor environments☆129Updated 4 years ago
- Web application to create indexes for GIAC certification examinations.☆138Updated 2 years ago
- ☆87Updated last year
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆114Updated last year
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆108Updated 5 years ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆53Updated 2 years ago
- ☆77Updated 5 years ago
- Collection of useful, up to date, Carbon Black Response Queries☆83Updated 4 years ago
- ATT&CK Remote Threat Hunting Incident Response☆200Updated 4 months ago
- Tool used to perform threat intelligence against packet data☆35Updated 3 months ago
- This repo is where I store my Threat Hunting ideas/content☆87Updated last year
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆44Updated 3 years ago
- Hunt malware with Volatility☆47Updated 11 months ago
- Resources for SANS CTI Summit 2021 presentation☆102Updated last year
- Jupyter notebooks for threat hunting☆55Updated last month
- Repository for SPEED SIEM Use Case Framework☆53Updated 4 years ago
- ☆116Updated last year
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆69Updated 4 years ago
- A community event for security researchers to share their favorite notebooks☆107Updated last year
- Blueteam operational triage registry hunting/forensic tool.☆145Updated last year
- My conference presentations☆66Updated last year
- attack2jira automates the process of standing up a Jira environment that can be used to track and measure ATT&CK coverage☆112Updated 2 years ago
- Automagically extract forensic timeline from volatile memory dump☆130Updated 11 months ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago
- Collection of created MindMaps☆150Updated last year
- All my slides for any talks☆23Updated 6 months ago
- Active Directory Purple Team Playbook☆108Updated last year
- Powershell - web traffic whitenoise generator☆47Updated 4 years ago