gertjanbruggink / Presentations
This directory contains presentations and related materials of my speaking engagements. I also use this to record historical presentations I found helpful.
☆13Updated 5 months ago
Related projects: ⓘ
- A MITRE ATT&CK Lookup Tool☆41Updated 4 months ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆57Updated last year
- Cheat sheets for threat hunting, detection and other stuff.☆31Updated last year
- ☆28Updated 3 years ago
- Random notes collected on the intertubes relating to DFIR☆32Updated last year
- Threat Hunter's Knowledge Base☆21Updated 2 years ago
- Supporting material for my presentation "Adversarial Threat Modelling — A Practical Approach to Purple Teaming in the Enterprise"☆50Updated 2 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆49Updated 2 years ago
- ☆25Updated 3 years ago
- BlackBerry Threat Research & Intelligence☆90Updated 10 months ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆29Updated 2 months ago
- ☆19Updated 2 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 2 years ago
- Logbook for Digital Forensics and Incident Response☆48Updated 2 months ago
- Placeholder for my detection repo and misc detection engineering content☆43Updated 10 months ago
- CSIRT Jump Bag☆26Updated 4 months ago
- This repo is where I store my Threat Hunting ideas/content☆85Updated last year
- Threat Hunt Investigation Methodology and Procedure☆14Updated 2 years ago
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆50Updated 2 years ago
- My Jupyter Notebooks☆36Updated 5 months ago
- Simple Script to Help You Find All Files Has Been Modified, Accessed, and Created In A Range Time.☆27Updated last year
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆34Updated 2 years ago
- ☆42Updated 3 months ago
- Library of threat hunts to get any user started!☆40Updated 4 years ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated last year
- my MSTICpy practice and custom tools repository☆11Updated 7 months ago
- Reference sheet for Threat Hunting Professional Course☆24Updated 5 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆48Updated last year
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆36Updated 6 months ago
- ☆21Updated 3 years ago