honeynet / forensic_challengesLinks
THP Forensic Challenges
☆22Updated last year
Alternatives and similar repositories for forensic_challenges
Users that are interested in forensic_challenges are comparing it to the libraries listed below
Sorting:
- Hashes of infamous malware☆26Updated last year
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆15Updated 3 years ago
- Small and highly portable detection tests.☆13Updated 7 years ago
- ☆30Updated 6 years ago
- ☆11Updated 4 years ago
- Scan and decode NetWire logs☆12Updated 2 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 4 years ago
- Carving tool based in Radare2 & Yara☆16Updated 6 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 7 years ago
- DPE - Default Password Enumeration☆34Updated 12 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Updated 4 years ago
- Collection of our CTF write-ups☆29Updated 4 years ago
- Repository for the SecurityTube Linux Assembly Expert Certification☆10Updated 7 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- Guidelines for writing secure code for Python developers.☆20Updated 8 years ago
- Scripts for OSCE☆18Updated 6 years ago
- DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).☆16Updated 5 years ago
- This is the official repository for Basic Malware Analysis Course☆20Updated 3 years ago
- ☆22Updated 4 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Updated 4 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 8 years ago
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.☆20Updated 2 years ago
- PowerShell Memory Pulling script☆19Updated 10 years ago
- This PowerShell script will automate the setup of a development environment, consisting of all the necessary software tools required to c…☆16Updated 5 years ago
- Extract credentials from lsass remotely☆16Updated 5 years ago
- Resource links (video, slides & code) for my conference talks | presentations | workshops☆15Updated 5 months ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆14Updated 7 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆14Updated 5 years ago