mvelazc0 / Talks-Presentations
Resource links (video, slides & code) for my conference talks | presentations | workshops
☆13Updated 3 weeks ago
Alternatives and similar repositories for Talks-Presentations:
Users that are interested in Talks-Presentations are comparing it to the libraries listed below
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆16Updated 3 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆14Updated 4 years ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 3 years ago
- Threat Mitigation Strategies☆25Updated last year
- PowerShell Memory Pulling script☆19Updated 9 years ago
- BloodHound Data Scanner☆44Updated 4 years ago
- Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant data☆13Updated 5 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 3 years ago
- ☆21Updated 3 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Accompanying PowerShell Modules for DevSec Defense Presentation☆28Updated 6 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- Defensive-oriented Active Directory enumeration☆23Updated 9 years ago
- A collection of searches, interesting events and tables on Crowdstrike Splunk.☆29Updated 3 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- incident response scripts☆19Updated 5 years ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆10Updated 2 years ago
- Mass Triage Tools☆20Updated 6 months ago
- OSSEM Modular☆27Updated 4 years ago
- Repository for LNK stuff☆29Updated 2 years ago
- ☆31Updated 2 months ago
- ☆10Updated 4 years ago
- ☆26Updated 3 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Updated 2 years ago
- Set of ultra technical notes about AD☆18Updated 6 years ago
- Notes from my "Implementing a Kick-Butt Training Program: Blue Team GO!" talk☆12Updated 5 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆36Updated last year
- The "DFUR" Splunk application and data that was presented at the 2020 SANS DFIR Summit.☆12Updated 4 years ago
- ☆11Updated 4 years ago