lucky-luk3 / Infosec_Notebooks
☆21Updated 2 years ago
Alternatives and similar repositories for Infosec_Notebooks
Users that are interested in Infosec_Notebooks are comparing it to the libraries listed below
Sorting:
- ☆19Updated 3 years ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆78Updated last year
- ☆27Updated 3 years ago
- Library of threat hunts to get any user started!☆44Updated 4 years ago
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- ShellSweeping the evil.☆52Updated 10 months ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆63Updated 2 years ago
- A repository of Sysmon For Linux configuration modules☆15Updated 3 years ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆38Updated last year
- Simple PowerShell script to enable process scanning with Yara.☆93Updated 2 years ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated last year
- YARA rule analyzer to improve rule quality and performance☆100Updated last month
- ☆11Updated last year
- ☆87Updated last year
- A home for detection content developed by the delivr.to team☆69Updated 3 months ago
- This repo is where I store my Threat Hunting ideas/content☆87Updated 2 years ago
- ☆21Updated 2 years ago
- Automated detection rule analysis utility☆29Updated 2 years ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- Simple Script to Help You Find All Files Has Been Modified, Accessed, and Created In A Range Time.☆27Updated 2 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated last year
- simple webapp for converting sigma rules into siem queries using the pySigma library☆48Updated last year
- Get-MiniTimeline - Triage Collection and Timeline Generation w/ KAPE☆31Updated 11 months ago
- Hunting Malicious Macros SANS Threathunting Summit 2021 Materials☆39Updated 3 years ago
- ESXi Cyber Security Incident Response Script☆24Updated 8 months ago
- Baseline a Windows System against LOLBAS☆26Updated last year
- List of custom developed KQL queries to help proactive security teams hunt for opportunistic and sophisticated threat activity by develop…☆26Updated 3 years ago
- ☆34Updated 2 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Updated 2 years ago