deepanshusood / SANS-Posters
SANS has a massive list of posters available for quick reference to aid you in your security learning.
☆13Updated 3 years ago
Alternatives and similar repositories for SANS-Posters:
Users that are interested in SANS-Posters are comparing it to the libraries listed below
- A repo hosting the Markua content for the EZ Tools manuals hosted on Leanpub☆65Updated last year
- Baseline a Windows System against LOLBAS☆25Updated 9 months ago
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆16Updated 8 months ago
- Threat Simulator for Enterprise Networks☆14Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 2 months ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago
- Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)☆68Updated last year
- ☆46Updated 3 weeks ago
- Reference sheet for Threat Hunting Professional Course☆25Updated 5 years ago
- A curated list of awesome threat detection and hunting resources☆16Updated 6 years ago
- Logbook for Digital Forensics and Incident Response☆50Updated 7 months ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- Penguin OS Forensic (or Flight) Recorder☆39Updated last month
- This repo is where I store my Threat Hunting ideas/content☆87Updated last year
- Lua plugin to extract data from Wireshark and convert it into MISP format☆47Updated last year
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- Log4Shell IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆18Updated 2 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆140Updated last year
- The ultimate solution for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆22Updated 6 months ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆38Updated 9 months ago
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆25Updated last year
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆18Updated last year
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆151Updated 9 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- Collection of videos of Raids on Cybercriminals☆18Updated 4 months ago
- The Threat Actor Profile Guide for CTI Analysts☆104Updated last year
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆31Updated last year
- This Repository gives the best and possible strategies against hunting the ransomware☆25Updated 2 years ago
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆24Updated 2 months ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆59Updated this week