lucky-luk3 / Infosec_NotebooksLinks
☆20Updated 2 years ago
Alternatives and similar repositories for Infosec_Notebooks
Users that are interested in Infosec_Notebooks are comparing it to the libraries listed below
Sorting:
- Library of threat hunts to get any user started!☆45Updated 5 years ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆81Updated 3 weeks ago
- This repo is where I store my Threat Hunting ideas/content☆88Updated 2 years ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆38Updated last year
- ☆88Updated 3 months ago
- Simple PowerShell script to enable process scanning with Yara.☆96Updated 3 years ago
- YARA rule analyzer to improve rule quality and performance☆105Updated 6 months ago
- ShellSweeping the evil.☆53Updated last year
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆67Updated 2 years ago
- Automated detection rule analysis utility☆29Updated 3 years ago
- Hunting Malicious Macros SANS Threathunting Summit 2021 Materials☆38Updated 4 years ago
- Active C&C Detector☆156Updated 2 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆207Updated 3 years ago
- Blueteam operational triage registry hunting/forensic tool.☆150Updated last month
- ☆62Updated 3 years ago
- Sigma rules to share with the community☆122Updated 9 months ago
- Active C2 IoCs☆99Updated 2 years ago
- A home for detection content developed by the delivr.to team☆72Updated 2 months ago
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆65Updated 3 years ago
- Simple Script to Help You Find All Files Has Been Modified, Accessed, and Created In A Range Time.☆27Updated 2 years ago
- OSSEM Data Dictionaries☆64Updated 9 months ago
- Rhaegal is a tool written in Python 3 used to scan Windows Event Logs for suspicious logs. Rhaegal uses custom rule format to detect sus…☆41Updated 2 years ago
- ☆28Updated 4 years ago
- Placeholder for my detection repo and misc detection engineering content☆42Updated 2 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated 2 years ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆85Updated 5 months ago
- Full of public notes and Utilities☆127Updated 8 months ago
- High-level Threat Intelligence playbooks☆17Updated 4 years ago
- A repository of Sysmon For Linux configuration modules☆15Updated 4 years ago
- ☆75Updated last month