Learning by Practising - Hack & Detect - A Practical Guide to Hacking and its Detection via network forensics
☆78Aug 28, 2023Updated 2 years ago
Alternatives and similar repositories for SUWtHEh-
Users that are interested in SUWtHEh- are comparing it to the libraries listed below
Sorting:
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆151Mar 1, 2026Updated 2 weeks ago
- Compiling a list of free learning resources in different areas of tech☆13Jul 19, 2023Updated 2 years ago
- Transform EQL detection rules to VQL artifacts☆12Nov 12, 2021Updated 4 years ago
- Matt's DFIR blog☆14Jul 28, 2025Updated 7 months ago
- Tool used to perform threat intelligence against packet data☆36Jan 26, 2025Updated last year
- ☆17Jan 21, 2026Updated last month
- An experimental Velociraptor implementation using cloud infrastructure☆26Dec 2, 2025Updated 3 months ago
- Scripts for TheHive.☆23Nov 15, 2019Updated 6 years ago
- ☆28Feb 17, 2022Updated 4 years ago
- Windows Thingies... but in Rust☆23Nov 12, 2022Updated 3 years ago
- Oriana is a threat hunting tool that leverages a subset of Windows events to build relationships, calculate totals and run analytics. The…☆176Jun 10, 2021Updated 4 years ago
- A python script to shift the timestamp on syslog data. Useful for forensicators combating time skew.☆21May 19, 2022Updated 3 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Injecting failures into BGP.☆10Dec 6, 2015Updated 10 years ago
- ATT&CK Remote Threat Hunting Incident Response☆206Dec 8, 2024Updated last year
- Configuration Extractor for BlackCat Ransomware☆31Mar 18, 2022Updated 4 years ago
- ☆14Jan 14, 2026Updated 2 months ago
- Re-play Security Events☆1,728Mar 20, 2024Updated 2 years ago
- CASCADE Server☆274Dec 8, 2022Updated 3 years ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆111Feb 6, 2020Updated 6 years ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆340Dec 3, 2025Updated 3 months ago
- InvestigationPlaybookSpec☆71Sep 26, 2017Updated 8 years ago
- Proof of concept communications from C# via a web browser process☆21Feb 15, 2019Updated 7 years ago
- Searches For Threat Hunting and Security Analytics☆238Mar 26, 2025Updated 11 months ago
- A command line tool that queries the Open Corporates Database and returns data on corporations under the copyleft Open Database License.☆33Jan 22, 2023Updated 3 years ago
- small IR scripts for orgs using G Suite☆18Feb 27, 2019Updated 7 years ago
- ☆100Nov 10, 2021Updated 4 years ago
- Jupyter notebooks for threat hunting☆60Mar 26, 2025Updated 11 months ago
- Notebooks created to attack and secure Active Directory environments☆27Nov 18, 2019Updated 6 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Jan 1, 2020Updated 6 years ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Oct 30, 2018Updated 7 years ago
- A Splunk Technology Add-on to forward filtered ETW events.☆30Oct 14, 2020Updated 5 years ago
- ☆11May 28, 2022Updated 3 years ago
- ☆54May 14, 2024Updated last year
- PowerShell Script to facilitate the processing of SRUM data for on-the-fly forensics and if needed threat hunting☆23Oct 26, 2019Updated 6 years ago
- Flame - Send vulnerabilities reports to SIEM☆15Jul 28, 2016Updated 9 years ago
- My Jupyter Notebooks☆36Mar 14, 2025Updated last year
- A completely unsupported set of scripts used in SANS FOR572, Advanced Network Forensics and Analysis☆28Aug 6, 2025Updated 7 months ago
- macOS Endpoint Security Message Analysis Tool☆47Jan 31, 2022Updated 4 years ago