lucky-luk3 / Infosec_NotebooksView external linksLinks
☆20May 10, 2023Updated 2 years ago
Alternatives and similar repositories for Infosec_Notebooks
Users that are interested in Infosec_Notebooks are comparing it to the libraries listed below
Sorting:
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆22Jun 15, 2022Updated 3 years ago
- ☆11Dec 17, 2024Updated last year
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆69Dec 2, 2022Updated 3 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆207Jul 21, 2022Updated 3 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Apr 25, 2022Updated 3 years ago
- High-level Threat Intelligence playbooks☆20Mar 6, 2021Updated 4 years ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆86Dec 17, 2025Updated last month
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Jul 27, 2020Updated 5 years ago
- Simple Script to Help You Find All Files Has Been Modified, Accessed, and Created In A Range Time.☆27Dec 1, 2022Updated 3 years ago
- A script to assist in processing forensic RAM captures for malware triage☆26Feb 4, 2021Updated 5 years ago
- Find out which countries have won the most medals and how the participation of nations has changed over time, with R☆10Aug 22, 2021Updated 4 years ago
- ☆26Jul 2, 2020Updated 5 years ago
- Powershell collection designed to assist in Threat Hunting Windows systems.☆27Apr 13, 2018Updated 7 years ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆32Nov 23, 2025Updated 2 months ago
- Simple chatbot created using Rasa☆10Feb 20, 2021Updated 4 years ago
- Automated detection rule analysis utility☆28Sep 22, 2022Updated 3 years ago
- Repository to publish sample use cases, templates, solutions, automations for Microsoft Defender Threat Intelligence (MDTI) product☆79Sep 9, 2024Updated last year
- ☆33Feb 26, 2022Updated 3 years ago
- ☆28Jul 5, 2025Updated 7 months ago
- Triaging Windows event logs based on SANS Poster☆46Nov 22, 2025Updated 2 months ago
- This repo is where I store my Threat Hunting ideas/content☆87May 9, 2023Updated 2 years ago
- PS-TrustedDocuments: PowerShell script to handle information on trusted documents for Microsoft Office☆37Mar 15, 2023Updated 2 years ago
- Stand-alone parser for User Access Logging from Server 2012 and newer systems☆78Jan 9, 2024Updated 2 years ago
- A model to analyse the performance of soccer players☆12Oct 28, 2020Updated 5 years ago
- ☆12Jan 20, 2024Updated 2 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- An elaborate approach for ABC-XYZ Analysis☆11May 10, 2020Updated 5 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- A minimalist Hugo theme that helps you build fully responsive documentation websites for small projects.☆10Oct 19, 2021Updated 4 years ago
- Analyzing the most strategic words to guess on Wordle, based on letter frequency distributions☆11Feb 20, 2022Updated 3 years ago
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 3 years ago
- ☆13Mar 28, 2024Updated last year
- PST Parser using pypff - Export all email headers and body to csv or json☆10Nov 8, 2019Updated 6 years ago
- ☆10Dec 14, 2020Updated 5 years ago
- A wireless playground using mac80211 hwsim devices and docker containers.☆10May 19, 2023Updated 2 years ago
- A collection of useful PowerShell tools to collect, organize, and visualize Sysmon event data☆39Mar 23, 2020Updated 5 years ago
- macOS forensic timeline generator using the analysis result DBs of mac_apt☆93Sep 7, 2023Updated 2 years ago
- Library of threat hunts to get any user started!☆48Sep 4, 2020Updated 5 years ago
- Modern, type-safe, zero-dependency Python library for serial port I/O access☆23Dec 16, 2025Updated last month