☆30Aug 21, 2024Updated last year
Alternatives and similar repositories for eCTHP-Notes
Users that are interested in eCTHP-Notes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of scripts and tools related to the eCTHPv2 exam by INE.☆19Jun 12, 2022Updated 3 years ago
- Reference sheet for Threat Hunting Professional Course☆26Mar 10, 2019Updated 7 years ago
- Comprehensive Toolkit for Boosting and Fostering Cybersecurity Compliance☆52Nov 26, 2024Updated last year
- An open-source computer forensics tool that can display summary as the result of Windows Event Log analysis based on the chosen function(…☆11Feb 2, 2023Updated 3 years ago
- CyberTalents Blue Team Scholarship 2023 By Trend Micro☆12Sep 28, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- SYNAPSE (SYNthetic AI Pot for Security Enhancement) and SYNAPSE-to-MITRE code repository. This project has been realized for my MSc degre…☆16Sep 23, 2024Updated last year
- Flag submission system for Attack/Defense CTFs☆13Jul 5, 2021Updated 4 years ago
- Subdomain Takeover lab is FREE for everyone. This means here is a legal to takeover Subdomain of this website. Here you'll find more tha…☆24Jan 1, 2025Updated last year
- **SCAM ALERT !!!!!!! ALPHABAY VE DARK WEB TURKİSH DOLANDIRICIDIR BU KONUYU AÇANLARDA KENDİLERİDİR UZAK DURUN** **BÜYÜK BİR DOLANDIRICIL…☆10Jul 14, 2023Updated 2 years ago
- Source code used at TweetFeed.live☆49Nov 21, 2022Updated 3 years ago
- Digital Forensics and Incident Response notes and Autopsy tool walkthrough☆11Feb 3, 2022Updated 4 years ago
- CommandInWiFi: Exploiting SSID Storage in WiFi Scanning for Command Injection☆41Mar 9, 2026Updated last month
- ☆25Aug 8, 2024Updated last year
- ☆11May 30, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Shellcode generation and encoding utility☆24Jul 13, 2022Updated 3 years ago
- Comprehensive notes and resources to ace the eLearnSecurity Junior Penetration Testing certificate, helping you master the art of ethical…☆13Nov 27, 2023Updated 2 years ago
- ☆12Nov 13, 2023Updated 2 years ago
- macos-collector - Automated Collection of macOS Forensic Artifacts for DFIR☆42Apr 13, 2026Updated 2 weeks ago
- A simple Node.js Express REST app with some OWASP vulnerabilities.☆22Aug 13, 2024Updated last year
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆17Apr 23, 2025Updated last year
- KQL Detections for Microsoft Sentinel and Microsoft 365 Defender☆21Nov 15, 2024Updated last year
- Behavorial analysis of malware using machine learning☆16Mar 13, 2018Updated 8 years ago
- Convert Sigma rules to LogRhythm searches☆23Feb 27, 2022Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A series of Linux and Windows based Forensics labs. Tools used include: FTK, EnCase, Sleuthkit, Autopsy, Volatility, etc.☆15Sep 17, 2020Updated 5 years ago
- Royal Road RTF Weaponizer object decoder☆24Sep 26, 2024Updated last year
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, depende…☆16Aug 29, 2025Updated 8 months ago
- KQL Queries for Advanced Hunting / Log Analytics☆13Jan 29, 2026Updated 3 months ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 4 years ago
- Some important DFIR Resources☆84Mar 16, 2023Updated 3 years ago
- Notes created for preparation of EJPTv2☆281Jan 18, 2023Updated 3 years ago
- Spring4Shell (CVE-2022-22965)☆12Apr 7, 2022Updated 4 years ago
- All binaries, tools,wordlists and tutorials you need to pass eCPPTv2 - For Free!☆26Jan 28, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This is a Cheatsheet for eJPT.☆16Jan 26, 2021Updated 5 years ago
- [DEPRECIATED] All writeups are moved to my main website☆14Mar 15, 2024Updated 2 years ago
- This repository is a comprehensive collection of resources, documentation, apps, and add-ons related to Splunk, a powerful data analytics…☆25Updated this week
- Windows Forensics Salt States☆22Updated this week
- You can access the sigma rules to detect malicious activities. It is organized by Mitre Att&ck categories.☆13Feb 7, 2022Updated 4 years ago
- A curated awesome list of lists of interview questions. Feel free to contribute!☆23Jul 24, 2024Updated last year
- ☆96Dec 25, 2025Updated 4 months ago