honeynet / forensic_challengesLinks
THP Forensic Challenges
☆23Updated 2 years ago
Alternatives and similar repositories for forensic_challenges
Users that are interested in forensic_challenges are comparing it to the libraries listed below
Sorting:
- Tool used to perform threat intelligence against packet data☆36Updated 10 months ago
- Hashes of infamous malware☆26Updated 2 years ago
- All the useful tools interesting to be used☆23Updated 3 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- PowerShell Memory Pulling script☆19Updated 10 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Updated 5 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆23Updated 9 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆57Updated 7 years ago
- ☆30Updated 7 years ago
- ☆11Updated 4 years ago
- Principles of MITRE ATT&CK in the fraud domain☆34Updated 6 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 3 years ago
- Compiles a json dataset using public sources that contains properties to aid in the detection and mitigation of over 1000 variants of ran…☆72Updated 2 years ago
- List of default passwords for Industrial Control Systems☆77Updated 8 years ago
- The "Virtual Whale" OSINT CTF at BSides DFW 2019!☆22Updated 6 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 3 years ago
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆26Updated 5 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Updated 6 years ago
- Reference sheet for Threat Hunting Professional Course☆25Updated 6 years ago
- The following repository contains the SecurityTube Linux Assembly Expert assignments, and exam☆17Updated 8 years ago
- WordPress version identification and vulnerability finder.☆31Updated 3 years ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Updated 6 years ago
- Black Friday deals (Cyber/OSINT/Infosec)☆29Updated 5 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated 2 years ago
- A script to assist in processing forensic RAM captures for malware triage☆26Updated 4 years ago
- ☆33Updated 10 months ago
- A few quick recipes for those that do not have much time during the day☆22Updated last year
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆34Updated 8 years ago
- ☆39Updated 5 years ago