honeynet / forensic_challenges
THP Forensic Challenges
☆21Updated last year
Alternatives and similar repositories for forensic_challenges
Users that are interested in forensic_challenges are comparing it to the libraries listed below
Sorting:
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 8 years ago
- ☆11Updated 4 years ago
- Custom scripts used during the scenario☆21Updated 4 years ago
- DPE - Default Password Enumeration☆34Updated 11 years ago
- Scripts I have made for blue team☆16Updated 7 years ago
- Malicious Link Blog☆25Updated last year
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆24Updated 8 years ago
- Hashes of infamous malware☆26Updated last year
- A Simple Log4j Indicator of Compromise Linux Detector☆15Updated 3 years ago
- ☆30Updated 6 years ago
- PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server☆8Updated 8 years ago
- Links to materials referenced in the SANS Tech Tuesday workshop June 30,2020☆29Updated 4 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆14Updated 5 years ago
- Simple Live Data Collection Tool☆21Updated 4 years ago
- Repository for the SecurityTube Linux Assembly Expert Certification☆10Updated 7 years ago
- OSCP Focused Lab Pastable with some general Red Teaming Pastables.☆10Updated 5 years ago
- Presentation Slides and Resources☆16Updated 11 months ago
- DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).☆16Updated 5 years ago
- Convert Wigle.net result from json to Kml☆15Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- Miscellaneous analysis tools☆27Updated 10 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Updated 7 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Updated 7 years ago
- Carving tool based in Radare2 & Yara☆16Updated 6 years ago
- ☆22Updated 4 years ago