StevenD33 / Lab-DFIR-SOC
☆64Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for Lab-DFIR-SOC
- IOC Collection 2022☆55Updated last year
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆64Updated 2 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆104Updated 2 years ago
- This repo is where I store my Threat Hunting ideas/content☆85Updated last year
- Simple PowerShell script to enable process scanning with Yara.☆90Updated 2 years ago
- Blueteam operational triage registry hunting/forensic tool.☆142Updated last year
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆146Updated last year
- Veil-PowerView is a powershell tool to gain network situational awareness on Windows domains.☆52Updated 9 years ago
- yara detection rules for hunting with the threathunting-keywords project☆87Updated this week
- ☆96Updated 3 weeks ago
- ☆155Updated 11 months ago
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆72Updated 2 weeks ago
- ☆25Updated 3 years ago
- ☆85Updated 9 months ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆93Updated last year
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆81Updated 2 years ago
- ☆61Updated last month
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆164Updated 2 years ago
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆147Updated 2 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆56Updated last week
- Simple Script to Help You Find All Files Has Been Modified, Accessed, and Created In A Range Time.☆27Updated last year
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆108Updated 3 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆57Updated 2 years ago
- Sigma detection rules for hunting with the threathunting-keywords project☆47Updated 2 weeks ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 2 years ago
- Default Detections for EDR☆94Updated 9 months ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆109Updated 11 months ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆143Updated this week
- Full of public notes and Utilities☆86Updated this week
- ☆34Updated 11 months ago