gertjanbruggink / PresentationsView external linksLinks
This directory contains presentations and related materials of my speaking engagements. I also use this to record historical presentations I found helpful.
☆17Feb 13, 2025Updated last year
Alternatives and similar repositories for Presentations
Users that are interested in Presentations are comparing it to the libraries listed below
Sorting:
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆114Nov 19, 2024Updated last year
- PowerShell Memory Pulling script☆19Mar 24, 2015Updated 10 years ago
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆25Nov 2, 2025Updated 3 months ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Jul 15, 2024Updated last year
- Hunting Malicious Macros SANS Threathunting Summit 2021 Materials☆39Oct 9, 2021Updated 4 years ago
- Mine patterns from logs☆27Dec 12, 2016Updated 9 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆36Jul 11, 2023Updated 2 years ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆34Oct 21, 2025Updated 3 months ago
- Python wrappers for mal_unpack☆37Sep 19, 2023Updated 2 years ago
- MSTIC Notebook Components☆35Sep 4, 2025Updated 5 months ago
- AIL project training materials☆39Jul 17, 2025Updated 6 months ago
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- ☆11Apr 25, 2021Updated 4 years ago
- Generate GSM authentication triplets (as per 3GPP TS 55.205)☆16Jan 11, 2018Updated 8 years ago
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- MISP to Microsoft Defender integration☆16Feb 6, 2026Updated last week
- Unifi Images☆21Apr 4, 2025Updated 10 months ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆103Dec 13, 2023Updated 2 years ago
- Cyber Underground General Intelligence Requirements☆97Feb 2, 2024Updated 2 years ago
- A repo to centralize some of the regular expressions I've found useful over the course of my DFIR career.☆107Nov 23, 2022Updated 3 years ago
- Wrapper for TSK (Sleuth Kit) Bindings☆12Jan 10, 2023Updated 3 years ago
- Build your own cloud virtual machine lab☆12Nov 25, 2025Updated 2 months ago
- List of links and resources referred to in my SANS OSINT Summit 2024 Talk "OSINT On The Russian Internet"☆11Feb 29, 2024Updated last year
- Disk Image Mounting Script☆11Jan 22, 2026Updated 3 weeks ago
- Custom Queries, Dashboards, and HIPs Rules☆10Jan 13, 2018Updated 8 years ago
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- RepoToStoreBugBountyInfo☆11Mar 11, 2020Updated 5 years ago
- Import AbuseCH IOC Feeds into MISP☆12Feb 17, 2021Updated 4 years ago
- snake-core - the real snake☆15Jul 11, 2023Updated 2 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆11Sep 21, 2022Updated 3 years ago
- CLI generator for Velociraptor offline collector☆15Oct 10, 2025Updated 4 months ago
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆13Sep 6, 2019Updated 6 years ago
- Script Center for System Center Configuration Manager☆12Jul 20, 2023Updated 2 years ago
- A one stop shop for all cyber tooling, frameworks and hacking methodologies☆11Jul 25, 2021Updated 4 years ago
- A full example report☆11Jul 23, 2019Updated 6 years ago
- Klara docker compose☆11May 19, 2020Updated 5 years ago
- Rhaegal is a tool written in Python 3 used to scan Windows Event Logs for suspicious logs. Rhaegal uses custom rule format to detect sus…☆42Sep 21, 2023Updated 2 years ago