ckane / cyber-defense
Content for cyber defense course
☆14Updated 10 years ago
Alternatives and similar repositories for cyber-defense
Users that are interested in cyber-defense are comparing it to the libraries listed below
Sorting:
- Some YARA rules i will add from time to time☆12Updated 5 years ago
- Site for IWS book content☆18Updated 6 years ago
- Use DNS to hunt for threats including DGAs☆15Updated 9 years ago
- Network Forensics Workshop Files☆17Updated 10 years ago
- Best practices in threat intelligence☆46Updated 2 years ago
- Python bindings for Yeti's API☆18Updated last year
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- Another MISP module for Python☆17Updated 5 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 6 months ago
- Performs OCR on image files and scans them for matches to YARA rules☆41Updated 6 years ago
- This repository is a curated list of pro bono incident response entities.☆20Updated last year
- Knowledge base of analytics designed to cover threats based on MITRE's ATT&CK.☆22Updated 6 years ago
- ☆30Updated 6 years ago
- Create an incident response triage toolkit for use with Windows or Linux.☆17Updated 4 years ago
- Home to the ActorTrackr source code☆24Updated 7 years ago
- Indices for courses in SANS' Network Security Operations curriculum☆15Updated 9 years ago
- Python script to batch query the Tor Relays and Bridges☆36Updated 6 years ago
- FastIR Agent is a Windows service to execute FastIR Collector on demand☆14Updated 8 years ago
- A simple ReST server to lookup threat actors (by name, synonym or UUID) and returning the corresponding MISP galaxy information about the…☆48Updated last year
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Updated 4 years ago
- Set of PoC for exploits for QRadar SIEM☆15Updated 7 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago
- Build your own threat hunting maturity model☆11Updated 7 years ago
- Security Operations Center Multiple Purpose Tool, takes IP address input, conducts OSINT, conducts splunk, bro, fireeye, imperva, and fir…☆21Updated 7 years ago
- Working through Practical Malware Analysis from No Starch Press☆13Updated 8 years ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 5 years ago
- A simple many-rules to many-files YARA scanner for incident response or malware zoos.☆26Updated 6 years ago
- Providing timelines based on OSINT Reports☆32Updated last year
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 6 years ago
- mindmap created for tools can be used during analysis/investigation☆27Updated 8 years ago