cyber6l / eCTHP-NotesLinks
☆29Updated last year
Alternatives and similar repositories for eCTHP-Notes
Users that are interested in eCTHP-Notes are comparing it to the libraries listed below
Sorting:
- CTF styled Digital Forensics labs, as offered in FAST NUCES Karachi during Spring 2023.☆320Updated 2 years ago
- ☆192Updated last year
- ☆59Updated 3 months ago
- ☆16Updated last year
- Practical Windows Forensics Training☆714Updated last year
- CLI tools for forensic investigation of Windows artifacts☆349Updated 6 months ago
- DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital For…☆421Updated 2 months ago
- Repository for SOC analysts, queries to investigate, advanced hunting, sites for analysis, malware samples, courses to improve skills, IO…☆91Updated 6 months ago
- This is a repository dedicated to the DFIR journey. Contains notes, reflections and links to tools.☆107Updated 2 weeks ago
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆409Updated 2 years ago
- Hands-on cybersecurity projects to enhance skills in phishing investigation, malware analysis, network intrusion detection, and DDoS atta…☆241Updated last year
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆724Updated 6 months ago
- Playbooks for SOC Analysts☆670Updated 3 years ago
- Some important DFIR Resources☆84Updated 2 years ago
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆111Updated last year
- ☆220Updated last year
- ☆42Updated 2 years ago
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆415Updated 8 months ago
- ☆20Updated 6 years ago
- Collection of scripts and tools related to the eCTHPv2 exam by INE.☆18Updated 3 years ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆201Updated last year
- A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat in…☆443Updated this week
- SOAR Automation with Shuffle, Wazuh & TheHive | This project integrates Shuffle SOAR, Wazuh SIEM, and TheHive to automate security incide…☆120Updated 11 months ago
- A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as …☆420Updated 6 months ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆631Updated 6 months ago
- Windows Malware Investigation Scripts & Docs☆85Updated last year
- Certification Cheatsheets☆198Updated 2 years ago
- MISP Playbooks☆222Updated 3 months ago
- Map tracking ransomware, by OCD World Watch team☆483Updated 2 weeks ago
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆274Updated 7 months ago