Getting FREE Cyber Security Resources have been a challenge always. Access Davy-Jones-Locker to get all what you might need to upskill yourself and create an impact in the InfoSec Community
☆62Mar 22, 2021Updated 5 years ago
Alternatives and similar repositories for Davy-Jones-Locker
Users that are interested in Davy-Jones-Locker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- just a little treasure chest of stuff I need to watch / read later☆32Mar 26, 2021Updated 5 years ago
- This Repository gives the best and possible strategies against hunting the ransomware☆26Aug 23, 2022Updated 3 years ago
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆85Mar 3, 2022Updated 4 years ago
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆43Jun 27, 2021Updated 4 years ago
- Volatility plugin to search for all Autostart Extensibility Points (AESPs)☆10May 16, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.☆17Oct 28, 2023Updated 2 years ago
- Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.☆16Oct 22, 2025Updated 6 months ago
- Field guide to gather low-hanging fruits☆15Mar 20, 2025Updated last year
- Forensics triage tool relying on Volatility and Foremost☆25Dec 3, 2023Updated 2 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆21Jul 1, 2023Updated 2 years ago
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19May 11, 2021Updated 4 years ago
- ☆14Nov 15, 2020Updated 5 years ago
- A tool to automate memory dump processing using Volatility, including optional Splunk integration.☆11Jul 29, 2020Updated 5 years ago
- Collection of Tools & Techniques for analyzing URLs☆33Oct 1, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆26Jun 22, 2022Updated 3 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- Contains compiled binaries of Volatility☆36May 18, 2025Updated 11 months ago
- MITRE Shield website☆19Oct 20, 2021Updated 4 years ago
- ☆16Oct 29, 2023Updated 2 years ago
- Digital Forensics for Pentesters - Hands-On Learning, by Packt Publishing☆10Jan 30, 2023Updated 3 years ago
- OSINT Bookmarks for Firefox / Chrome / Edge / Safari☆66May 24, 2020Updated 5 years ago
- ☆23Jun 1, 2022Updated 3 years ago
- Azure AD Incident Response☆28Oct 8, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Community Detection Signature Build and Distribution Pipeline for YARA, Suricata, Snort and Sigma☆27Jun 20, 2023Updated 2 years ago
- CVE's we discovered along the way☆17Oct 18, 2021Updated 4 years ago
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆22Jun 15, 2022Updated 3 years ago
- Yet another machine learning-based WAF research☆26Jun 21, 2022Updated 3 years ago
- Scripts and lists to help generate YARA friendly string mutations☆22Apr 9, 2023Updated 3 years ago
- A free cybersecurity study plan to build a cybersecurity career.☆46Mar 6, 2025Updated last year
- Simple Neo4j PowerShell Wrapper☆30Oct 24, 2019Updated 6 years ago
- Virtual Lab builder and player☆15Aug 25, 2021Updated 4 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Jun 10, 2017Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆36Aug 12, 2022Updated 3 years ago
- The tutorial of "Kubernetes Security for Microservices"☆14Oct 3, 2023Updated 2 years ago
- ☆16Aug 29, 2025Updated 8 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆56Dec 5, 2024Updated last year
- A few quick recipes for those that do not have much time during the day☆22Oct 28, 2024Updated last year
- Linux Tools for PowerShell People.☆17Sep 24, 2021Updated 4 years ago
- A hex viewer for the sleuths!☆20Nov 7, 2025Updated 6 months ago