ckane / cyber-defenseLinks
Content for cyber defense course
☆14Updated 10 years ago
Alternatives and similar repositories for cyber-defense
Users that are interested in cyber-defense are comparing it to the libraries listed below
Sorting:
- Some YARA rules i will add from time to time☆12Updated 6 years ago
- Network Forensics Workshop Files☆17Updated 10 years ago
- Python bindings for Yeti's API☆18Updated last year
- This repository is a curated list of pro bono incident response entities.☆20Updated 2 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- CyCAT.org taxonomies☆15Updated 4 years ago
- Best practices in threat intelligence☆47Updated 2 years ago
- ☆14Updated 7 years ago
- Use DNS to hunt for threats including DGAs☆15Updated 9 years ago
- Home to the ActorTrackr source code☆24Updated 8 years ago
- ☆34Updated 4 years ago
- The Fastest way to consume Threat Intel☆25Updated 3 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 7 months ago
- Site for IWS book content☆18Updated 6 years ago
- Knowledge base of analytics designed to cover threats based on MITRE's ATT&CK.☆22Updated 6 years ago
- DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).☆16Updated 5 years ago
- Home to the ActorTrackr source code☆29Updated 7 years ago
- A simple ReST server to lookup threat actors (by name, synonym or UUID) and returning the corresponding MISP galaxy information about the…☆48Updated last year
- Presentation Slides and Video links☆32Updated 3 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 6 years ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 6 years ago
- Working through Practical Malware Analysis from No Starch Press☆13Updated 8 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- A simple many-rules to many-files YARA scanner for incident response or malware zoos.☆26Updated 7 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- Build Automated Machine Images for MISP☆28Updated 2 years ago
- Set of PoC for exploits for QRadar SIEM☆15Updated 7 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Updated 6 years ago
- Providing timelines based on OSINT Reports☆32Updated 2 years ago