My Jupyter Notebooks
☆36Mar 14, 2025Updated 11 months ago
Alternatives and similar repositories for jupyter-notebooks
Users that are interested in jupyter-notebooks are comparing it to the libraries listed below
Sorting:
- This repository contains the code and PCAPS used for the SANS webinar, "Hacking Proprietary Protocols" given on February 23, 2021.☆34Apr 9, 2022Updated 3 years ago
- A threat sighting collects the behavior of a real threats and the observables used during its engagement.☆12Mar 29, 2022Updated 3 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Jan 8, 2024Updated 2 years ago
- ☆14Feb 8, 2020Updated 6 years ago
- ☆10Mar 31, 2021Updated 4 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- ☆42Dec 13, 2020Updated 5 years ago
- Active Directory Purple Team Playbook☆116May 8, 2023Updated 2 years ago
- A tool to display Windows Event logs as they happen.☆14Sep 19, 2023Updated 2 years ago
- Scripts for Looking up OUIs or Vendor information from MAC addresses☆11Dec 24, 2023Updated 2 years ago
- Bulk hostname lookup using shodan☆14Jun 1, 2022Updated 3 years ago
- ☆28May 25, 2021Updated 4 years ago
- Dependency vulnerability auditor for Ruby☆13Jan 22, 2026Updated last month
- ☆30Nov 15, 2018Updated 7 years ago
- ☆19Jun 26, 2017Updated 8 years ago
- Six Degrees of Domain Admin☆15Oct 23, 2017Updated 8 years ago
- A repository to host emojis used in the Digital Forensics Discord Server☆18May 28, 2022Updated 3 years ago
- Detection Engineering Tools☆25Feb 26, 2026Updated last week
- Microsoft Sentinel2Go is an open source project developed to expedite the deployment of a Microsoft Sentinel research lab.☆586Jan 22, 2025Updated last year
- ☆57Jan 28, 2024Updated 2 years ago
- Tool to convert Neustar's GeoPoint data to Maxmind's GeoIP database format for ease of use.☆20Feb 1, 2019Updated 7 years ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆53Oct 23, 2024Updated last year
- ☆77Jun 25, 2019Updated 6 years ago
- A few quick recipes for those that do not have much time during the day☆22Oct 28, 2024Updated last year
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆57Updated this week
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆26Apr 28, 2024Updated last year
- Open-Source PowerShell module to allow online play of Backdoors & Breaches card game devised by Black Hills Information Security☆56Mar 13, 2021Updated 4 years ago
- Forensics triage tool relying on Volatility and Foremost☆25Dec 3, 2023Updated 2 years ago
- Notebooks created to attack and secure Active Directory environments☆27Nov 18, 2019Updated 6 years ago
- Mapping your datasources and detections to the MITRE ATT&CK Navigator framework.☆58May 25, 2020Updated 5 years ago
- JPCERT/CC public YARA rules repository☆109Nov 14, 2025Updated 3 months ago
- Repository of public reference frameworks for the DFIR community.☆122Jul 4, 2023Updated 2 years ago
- A triage data collection script for macOS☆29Nov 27, 2020Updated 5 years ago
- Strelka Web UI for File Submission and Analysis☆75Feb 11, 2026Updated 3 weeks ago
- Mine patterns from logs☆27Dec 12, 2016Updated 9 years ago
- ☆134Mar 21, 2024Updated last year
- this script will help you find favicon hashes which you can use to shodan to get more details about an asset☆30Mar 18, 2025Updated 11 months ago
- public assets for ironcat emulation software ;)☆14Sep 8, 2023Updated 2 years ago
- En este repositorio podrás encontrar los ejercicios del canal @aprendePython3 de Telegram así como sus soluciones.☆10May 20, 2020Updated 5 years ago