VNCERT-CC / digital-forensics-labLinks
π»π³ [VNCERT/CC] Digital Forensics Lab π»π³
β21Updated 11 months ago
Alternatives and similar repositories for digital-forensics-lab
Users that are interested in digital-forensics-lab are comparing it to the libraries listed below
Sorting:
- DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital Forβ¦β382Updated 3 months ago
- A centralized and enhanced memory analysis platformβ509Updated 4 months ago
- Automated YARA Rule Standardization and Quality Assurance Toolβ258Updated last week
- CLI tools for forensic investigation of Windows artifactsβ347Updated 4 months ago
- A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat inβ¦β419Updated this week
- Awesome list of keywords and artifacts for Threat Hunting sessionsβ616Updated 3 months ago
- Signatures and IoCs from public Volexity blog posts.β360Updated last month
- IATelligence is a Python script that will extract the IAT of a PE file and request GPT to get more information about the API and the ATT&β¦β370Updated 2 years ago
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicatβ¦β58Updated last year
- An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabzβ390Updated 2 weeks ago
- CTF styled Digital Forensics labs, as offered in FAST NUCES Karachi during Spring 2023.β314Updated 2 years ago
- MISP Playbooksβ219Updated last month
- Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!β409Updated last year
- ATT&CK Evaluations Libraryβ83Updated 4 months ago
- Repository resource for threat hunterβ158Updated 7 years ago
- β24Updated last year
- yara detection rules for hunting with the threathunting-keywords projectβ153Updated 6 months ago
- This is a repository dedicated to the DFIR journey. Contains notes, reflections and links to tools.β101Updated last week
- Rapidly Search and Hunt through Linux Forensics Artifactsβ200Updated last year
- Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.β211Updated this week
- This repository contains indicators of compromise (IOCs) of our various investigations.β308Updated 3 weeks ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extracβ¦β150Updated last year
- firedrill is a malware simulation harness for evaluating your security controlsβ194Updated last year
- Rules generated from our investigations.β202Updated 5 months ago
- Jupyter Notebooks for the Blue Teamβ147Updated 8 months ago
- A repository of credential stealer formatsβ233Updated 5 months ago
- SIEM Cheat Sheetβ77Updated 2 years ago
- Generate MITRE ATT&CK and D3FEND from a list of CVEs. Database with CVE, CWE, CAPEC, MITRE ATT&CK and D3FEND Techniques data is updated dβ¦β249Updated this week
- Incident Response collection and processing scripts with automated reporting scriptsβ315Updated last year
- Advanced Bash script designed for conducting digital forensics on Linux systemsβ145Updated last year