The-Taggart-Institute / python-for-defendersLinks
Python for Defenders Course Resources
☆18Updated 3 weeks ago
Alternatives and similar repositories for python-for-defenders
Users that are interested in python-for-defenders are comparing it to the libraries listed below
Sorting:
- Threat Hunt Investigation Methodology and Procedure☆15Updated 3 years ago
- ☆34Updated 2 years ago
- ☆13Updated 2 years ago
- SIEM Cheat Sheet☆76Updated 2 years ago
- MayorSec DNS Enumeration Tool☆87Updated 9 months ago
- ☆31Updated 4 years ago
- Cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for them☆28Updated last year
- Repo to hold my PowerShell Scripts☆17Updated 2 years ago
- Script to manage and create local pentesting training virtual lab☆49Updated 5 years ago
- Penetration Testing Lab☆26Updated 11 years ago
- ☆21Updated 2 years ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 3 years ago
- ☆45Updated 3 years ago
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆43Updated 3 years ago
- ☆24Updated 3 years ago
- ☆64Updated 4 years ago
- This Repository gives the best and possible strategies against hunting the ransomware☆26Updated 3 years ago
- ☆16Updated 4 years ago
- ☆65Updated 2 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆61Updated last year
- Jupyter Notebooks for the Blue Team☆36Updated 7 months ago
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆19Updated 10 months ago
- Cloudformation Template to Launch the SOC from Kali Purple☆51Updated last year
- list of useful commands, shells and notes related to OSCP☆80Updated 7 years ago
- Useful resources about phishing email analysis☆85Updated 6 months ago
- Resources for AD penetration testing and security☆32Updated 3 years ago
- OSCP tools and notes☆40Updated 6 years ago
- Linux Baseline and Forensic Triage Tool - BETA☆57Updated 2 years ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆12Updated 3 years ago
- ☆13Updated 3 years ago