moshekaplan / cyber_training_materialsView external linksLinks
Training materials I've written.
☆11Nov 11, 2025Updated 3 months ago
Alternatives and similar repositories for cyber_training_materials
Users that are interested in cyber_training_materials are comparing it to the libraries listed below
Sorting:
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Mar 27, 2017Updated 8 years ago
- ☆18Feb 25, 2024Updated last year
- Carve files for MFT entries (eg. blkls output or memory dumps). Recovers filenames (long & short), timestamps ($STD & $FN) and data if re…☆22Jun 3, 2019Updated 6 years ago
- Automated threat intelligence collection with McAfee ATD, OpenDXL and MISP☆22Feb 21, 2020Updated 5 years ago
- Data Structures and Algorithms. Contribute and Learn together.☆11Oct 11, 2022Updated 3 years ago
- A collection of pentest tools and resources targeting Hadoop environments☆35Mar 2, 2017Updated 8 years ago
- Get-MiniTimeline - Triage Collection and Timeline Generation w/ KAPE☆32May 25, 2024Updated last year
- Splunk App to assist Sysmon Threat Hunting☆38Mar 7, 2017Updated 8 years ago
- Automated Memory Forensic☆34Jul 18, 2018Updated 7 years ago
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆12Oct 14, 2024Updated last year
- Lazy SPL to detect Spring4Shell exploitation☆12Jul 8, 2022Updated 3 years ago
- Heroku Force.com Workbook Demo☆17May 31, 2017Updated 8 years ago
- A technical companion repository archiving code implementations and research artifacts shared on ResearchGate.☆12Feb 7, 2026Updated last week
- Fix for the CVE-2021-36934☆10Oct 15, 2021Updated 4 years ago
- How to create VMware vagrant box☆11May 10, 2020Updated 5 years ago
- A little bit of help.☆13Jul 25, 2024Updated last year
- Info & resources for CSC 325 Computer Architecture at TCNJ☆11Oct 1, 2020Updated 5 years ago
- Dockerfiles for NSM tools☆84Apr 14, 2017Updated 8 years ago
- Detecting DNS Spoofing, DNS Tunneling, DNS Exfiltration☆36Sep 28, 2015Updated 10 years ago
- IITH BTECH CSE all Courses' Codes and Assignments☆11May 12, 2021Updated 4 years ago
- The evolution of NxRansomware☆11Jun 14, 2019Updated 6 years ago
- Actual good v3 onion links☆14Jan 19, 2026Updated 3 weeks ago
- Reverse-engineering, documenting and hacking a dog shock collar for use as a sex toy☆10Jun 13, 2021Updated 4 years ago
- This repo stores something about reverse engineering technique fundemental☆15Jan 16, 2023Updated 3 years ago
- more extensions for https://rpcx.io☆10Apr 11, 2021Updated 4 years ago
- Unofficial API for xAI's Grokipedia☆33Jan 11, 2026Updated last month
- Marlin Simulator UI☆15Dec 1, 2025Updated 2 months ago
- ☆13Dec 14, 2021Updated 4 years ago
- FileSigExtractor is a python based tool which extracts the file signatures of all files within a directory and writes the output to a CSV…☆10Jul 15, 2023Updated 2 years ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- Volatility plugin to search for all Autostart Extensibility Points (AESPs)☆10May 16, 2024Updated last year
- This repository contains all the solutions of assignments, starter files and other materials related to this specialization.☆10Jan 31, 2021Updated 5 years ago
- Zeek script library for getting the effective TLD of a domain.☆14Apr 12, 2024Updated last year
- ☆10Nov 21, 2023Updated 2 years ago
- AWS Live Response☆11Sep 19, 2017Updated 8 years ago
- Repo contains code for our DerbyCon 2016 talk comparing Binary Ninja and IDA Pro.☆10Sep 18, 2016Updated 9 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- ☆13Aug 17, 2020Updated 5 years ago
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year