VNCERT-CC / digital-forensics-labLinks
π»π³ [VNCERT/CC] Digital Forensics Lab π»π³
β21Updated last year
Alternatives and similar repositories for digital-forensics-lab
Users that are interested in digital-forensics-lab are comparing it to the libraries listed below
Sorting:
- Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!β460Updated last year
- IATelligence is a Python script that will extract the IAT of a PE file and request GPT to get more information about the API and the ATT&β¦β372Updated 3 years ago
- β23Updated last year
- CTF styled Digital Forensics labs, as offered in FAST NUCES Karachi during Spring 2023.β320Updated 2 years ago
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicatβ¦β60Updated last year
- A curated collection of DFIR skills and workflows for InfoSec practitioners.β244Updated this week
- SIEM Cheat Sheetβ80Updated 2 years ago
- A centralized and enhanced memory analysis platformβ517Updated 6 months ago
- Just some lists of Malware Configsβ173Updated last year
- An open-source self-hosted purple team management web application.β302Updated 2 weeks ago
- DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital Forβ¦β421Updated 2 months ago
- This is a repository dedicated to the DFIR journey. Contains notes, reflections and links to tools.β107Updated 2 weeks ago
- CLI tools for forensic investigation of Windows artifactsβ349Updated 6 months ago
- Repository resource for threat hunterβ158Updated 7 years ago
- Awesome list of keywords and artifacts for Threat Hunting sessionsβ631Updated 6 months ago
- Indicators of Compromise (IOCs) from malware or suspicious network trafficβ127Updated last week
- π High-performance, multi-threaded YARA & IOC scannerβ256Updated this week
- Signatures and IoCs from public Volexity blog posts.β362Updated 2 months ago
- Jupyter Notebooks for the Blue Teamβ145Updated 10 months ago
- MISP Playbooksβ222Updated 3 months ago
- Some Threat Hunting queries useful for blue teamersβ131Updated 3 years ago
- Automated YARA Rule Standardization and Quality Assurance Toolβ278Updated last week
- Incident Response collection and processing scripts with automated reporting scriptsβ319Updated last year
- A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat inβ¦β445Updated this week
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repositoryβ127Updated 2 years ago
- firedrill is a malware simulation harness for evaluating your security controlsβ197Updated 2 years ago
- Sample evtx files to use for testing hayabusa detection rulesβ64Updated 3 months ago
- yara detection rules for hunting with the threathunting-keywords projectβ157Updated 9 months ago
- Creation of a laboratory for malware analysis in AWSβ106Updated 3 years ago
- A repository of credential stealer formatsβ243Updated 8 months ago