CCP, Kesha Williams, 11-5-2020
☆20Jul 6, 2023Updated 2 years ago
Alternatives and similar repositories for content-aws-ccp-labs
Users that are interested in content-aws-ccp-labs are comparing it to the libraries listed below
Sorting:
- A collection of Python resources for Blue Team security work☆16Sep 23, 2018Updated 7 years ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- A quick bash script that I created in order to speed up the creation of usable kali boxes.☆11Oct 29, 2021Updated 4 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- Sunburst IOCs for Splunk Ingest☆18Jan 28, 2021Updated 5 years ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Dec 16, 2021Updated 4 years ago
- My first trial at Ethical Hacking Write Ups☆23Jul 23, 2020Updated 5 years ago
- Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.☆29Apr 10, 2024Updated last year
- ☆26Jun 22, 2022Updated 3 years ago
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆27Sep 21, 2020Updated 5 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆39May 3, 2021Updated 4 years ago
- ☆37Dec 17, 2020Updated 5 years ago
- ☆42Dec 22, 2020Updated 5 years ago
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Jul 22, 2025Updated 7 months ago
- An HTTP proxy library for Go☆17Jun 22, 2022Updated 3 years ago
- Deploy MISP Project software with Vagrant.☆45Jun 15, 2020Updated 5 years ago
- ☆10Mar 31, 2021Updated 4 years ago
- Plugin that serves the ATT&CK website alongside CALDERA.☆12Feb 24, 2020Updated 6 years ago
- Is a portable forensic tool for analyzing Windows logs, pre-organized according to the methodology outlined in this job: https://cybersec…☆15Jul 19, 2025Updated 7 months ago
- All my POC related to malware development☆15Feb 19, 2026Updated 2 weeks ago
- Splunk Remote Work Insights - Executive Dashboard☆43Aug 20, 2020Updated 5 years ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Apr 10, 2024Updated last year
- An automation tool that scans sub-domains, sub-domain takeover and then filters out xss, ssti, ssrf and more injection point parameters.☆19Sep 9, 2025Updated 5 months ago
- pyJARM is a library for doing JARM fingerprinting using python☆50Mar 23, 2025Updated 11 months ago
- A tool to automate memory dump processing using Volatility, including optional Splunk integration.☆12Jul 29, 2020Updated 5 years ago
- Threat Analytics Search Chrome Extension☆12Updated this week
- ☆11May 13, 2024Updated last year
- Feed for verious malicious IPs such as malware and botnets☆12Jun 20, 2016Updated 9 years ago
- cryptam document malware analysis tool☆12Jun 18, 2023Updated 2 years ago
- Splunk app for visualization of DMARC RUA mails☆15Sep 26, 2025Updated 5 months ago
- A tool to display Windows Event logs as they happen.☆14Sep 19, 2023Updated 2 years ago
- Kaseya REvil CNC domains☆12Jan 30, 2024Updated 2 years ago
- Sentinel Recon Tools Workbook☆14Aug 24, 2022Updated 3 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆46Jan 2, 2022Updated 4 years ago
- A script to test for subdomain takeovers from a list of domains☆12Feb 18, 2023Updated 3 years ago
- CLI Frontend for PowerShell Empire.☆49Jun 26, 2021Updated 4 years ago
- ☆44Nov 30, 2022Updated 3 years ago
- Reviews and tests of security products☆17Dec 28, 2024Updated last year
- Software for managing image lifecycle: build, test, upload and deprecation☆14Aug 3, 2022Updated 3 years ago