Learning by Practising - Hack & Detect - A Practical Guide to Hacking and its Detection via network forensics
☆78Aug 28, 2023Updated 2 years ago
Alternatives and similar repositories for SUWtHEh-
Users that are interested in SUWtHEh- are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Jan 18, 2020Updated 6 years ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆153May 1, 2026Updated 2 weeks ago
- Transform EQL detection rules to VQL artifacts☆12Nov 12, 2021Updated 4 years ago
- Matt's DFIR blog☆14Jul 28, 2025Updated 9 months ago
- Tool used to perform threat intelligence against packet data☆36Jan 26, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆17Mar 31, 2026Updated last month
- An experimental Velociraptor implementation using cloud infrastructure☆26Dec 2, 2025Updated 5 months ago
- Scripts for TheHive.☆23Nov 15, 2019Updated 6 years ago
- Windows Thingies... but in Rust☆23Nov 12, 2022Updated 3 years ago
- Oriana is a threat hunting tool that leverages a subset of Windows events to build relationships, calculate totals and run analytics. The…☆174Jun 10, 2021Updated 4 years ago
- A python script to shift the timestamp on syslog data. Useful for forensicators combating time skew.☆21May 19, 2022Updated 4 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Injecting failures into BGP.☆10Dec 6, 2015Updated 10 years ago
- ATT&CK Remote Threat Hunting Incident Response☆203Dec 8, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆14Jan 14, 2026Updated 4 months ago
- Configuration Extractor for BlackCat Ransomware☆31Mar 18, 2022Updated 4 years ago
- Re-play Security Events☆1,753Mar 20, 2024Updated 2 years ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆111Feb 6, 2020Updated 6 years ago
- Local File Inclusion (LFI) in FHEM 6.0 allows an attacker to include a file, it can lead to sensitive information disclosure.☆12Jan 20, 2021Updated 5 years ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆340Dec 3, 2025Updated 5 months ago
- InvestigationPlaybookSpec☆71Sep 26, 2017Updated 8 years ago
- Proof of concept communications from C# via a web browser process☆21Feb 15, 2019Updated 7 years ago
- Searches For Threat Hunting and Security Analytics☆239Mar 26, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆100Nov 10, 2021Updated 4 years ago
- small IR scripts for orgs using G Suite☆18Feb 27, 2019Updated 7 years ago
- Examples of simple code patterns causing BOF☆14Apr 10, 2020Updated 6 years ago
- Notebooks created to attack and secure Active Directory environments☆27Nov 18, 2019Updated 6 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆33Jan 1, 2020Updated 6 years ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Oct 30, 2018Updated 7 years ago
- A Splunk Technology Add-on to forward filtered ETW events.☆31Oct 14, 2020Updated 5 years ago
- ☆54May 14, 2024Updated 2 years ago
- PowerShell Script to facilitate the processing of SRUM data for on-the-fly forensics and if needed threat hunting☆23Oct 26, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Flame - Send vulnerabilities reports to SIEM☆15Jul 28, 2016Updated 9 years ago
- My Jupyter Notebooks☆37Mar 14, 2025Updated last year
- A completely unsupported set of scripts used in SANS FOR572, Advanced Network Forensics and Analysis☆28Aug 6, 2025Updated 9 months ago
- Resources for DFIR. And more.☆11Jul 3, 2024Updated last year
- macOS Endpoint Security Message Analysis Tool☆47Jan 31, 2022Updated 4 years ago
- Network Forensic Extendable Analysis Tool☆40May 22, 2022Updated 3 years ago
- Repository resource for threat hunter☆159Sep 14, 2018Updated 7 years ago