honeynet / forensic_challenges
THP Forensic Challenges
☆21Updated last year
Alternatives and similar repositories for forensic_challenges:
Users that are interested in forensic_challenges are comparing it to the libraries listed below
- DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).☆16Updated 5 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 7 years ago
- ☆30Updated 6 years ago
- Custom scripts used during the scenario☆21Updated 3 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 7 years ago
- Hashes of infamous malware☆26Updated last year
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- ☆22Updated 4 years ago
- recon-ng modules for Censys☆37Updated last year
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 7 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆22Updated 7 years ago
- mindmap created for tools can be used during analysis/investigation☆27Updated 8 years ago
- Scan and decode NetWire logs☆11Updated 2 years ago
- Personal blog about security, exploitation, CTFs, ...☆20Updated 6 years ago
- ☆11Updated 4 years ago
- PowerShell Memory Pulling script☆19Updated 10 years ago
- Speaking materials from conferences I've given☆9Updated 2 years ago
- ☆12Updated 2 years ago
- Repository for the SecurityTube Linux Assembly Expert Certification☆10Updated 7 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Updated 7 years ago
- Carving tool based in Radare2 & Yara☆15Updated 6 years ago
- Indices for courses in SANS' Network Security Operations curriculum☆15Updated 9 years ago
- Malicious Link Blog☆24Updated last year
- A utility for password spraying using kerberos from an untrusted/non-domain joined Kali linux host. Useful for user and KDC/DC enumeratio…☆18Updated last year
- Passive recon / OSINT automation script☆40Updated 6 years ago
- Collection of scripts and tools that I created to aid in my testing.☆14Updated 3 years ago
- Network Forensics Workshop Files☆17Updated 9 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 2 years ago
- CERT Australia Cyber Threat Intelligence (CTI) Toolkit☆12Updated 7 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago