VanAwful / GIAC-Index-CreatorLinks
Convert your spreadsheet or CSV for the GIAC exam to a more compact index. Inspired by Voltaire and usable offline.
☆18Updated 7 months ago
Alternatives and similar repositories for GIAC-Index-Creator
Users that are interested in GIAC-Index-Creator are comparing it to the libraries listed below
Sorting:
- Tools for simulating threats☆199Updated 2 years ago
- Indexes for SANS Courses and GIAC Certifications☆276Updated last year
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆146Updated last week
- Web application to create indexes for GIAC certification examinations.☆150Updated 2 years ago
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆127Updated 2 years ago
- The latest pyWars client for the SEC573 class☆48Updated 10 months ago
- Zerofox Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆45Updated 5 years ago
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆85Updated 3 years ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆77Updated 5 years ago
- Open Threat Hunting Framework☆122Updated 2 years ago
- Consolidation of various resources related to Microsoft Sysmon & sample data/log☆121Updated 4 years ago
- DigitalShadows Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆45Updated 6 years ago
- Some Threat Hunting queries useful for blue teamers☆131Updated 3 years ago
- Tools to automatically create a SANS index based off the course pdf files.☆120Updated 5 years ago
- links collected from SOC Core Skills class☆85Updated 5 years ago
- Jupyter Notebooks for the Blue Team☆146Updated 9 months ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Updated 3 years ago
- Jupyter notebooks for threat hunting☆60Updated 9 months ago
- ☆42Updated last year
- Identify Azure blobs using a wordlist of account name and container name strings☆44Updated 9 months ago
- Repository resource for threat hunter☆158Updated 7 years ago
- ☆23Updated 3 years ago
- A GeoIP lookup utility utilizing ipinfo.io services.☆93Updated 2 years ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆119Updated last year
- ☆133Updated 4 years ago
- ☆64Updated 4 years ago
- A collection of Splunk's Search Processing Language (SPL) for Threat Hunting with CrowdStrike Falcon☆214Updated 5 years ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆342Updated last month
- Docker Crash Course: How to containerize your favorite security tools☆28Updated 2 years ago
- Practical Threat Detection Engineering, Published by Packt☆80Updated 2 years ago