adanalvarez / AWS-malware-lab
Creation of a laboratory for malware analysis in AWS
☆95Updated 2 years ago
Alternatives and similar repositories for AWS-malware-lab:
Users that are interested in AWS-malware-lab are comparing it to the libraries listed below
- Completely Risky Active-Directory Simulation Hub☆99Updated last year
- Jupyter Notebooks for the Blue Team☆145Updated 2 years ago
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆183Updated 8 months ago
- Free training course offered at Hack Space Con 2023☆138Updated last year
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆153Updated 10 months ago
- Windows Malware Investigation Scripts & Docs☆75Updated 4 months ago
- Tools for simulating threats☆183Updated last year
- Some Threat Hunting queries useful for blue teamers☆125Updated 2 years ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆149Updated 4 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆118Updated 11 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 10 months ago
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆112Updated last year
- SIEM Cheat Sheet☆73Updated last year
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆183Updated last month
- ☆46Updated 3 weeks ago
- Some important DFIR Resources☆83Updated 2 years ago
- This repo is where I store my Threat Hunting ideas/content☆87Updated last year
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆109Updated last year
- Open Threat Hunting Framework☆112Updated last year
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆194Updated 8 months ago
- Automated security lab provisioning☆73Updated this week
- A collection of CVEs weaponized by ransomware operators☆111Updated last week
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆95Updated last year
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆102Updated 2 years ago
- Harness the power of Splunk for your investigations☆92Updated last week
- CarbonBlack EDR detection rules and response actions☆71Updated 6 months ago
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated 10 months ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆183Updated 3 months ago
- God Mode Detection Rules☆134Updated 7 months ago