nipunjaswal / networkforensics
Hands-On Network Forensics by Nipun Jaswal
☆46Updated last year
Alternatives and similar repositories for networkforensics:
Users that are interested in networkforensics are comparing it to the libraries listed below
- ☆34Updated 4 years ago
- DigitalShadows Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆36Updated 5 years ago
- ☆51Updated 3 years ago
- Wrap any binary into a cached webserver☆53Updated 3 years ago
- Collecting & Hunting for IOCs with gusto and style☆238Updated 3 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- The FASTEST way to consume threat intel.☆68Updated last year
- This program exports MITRE ATT&CK framework in ELK dashboard☆78Updated 2 years ago
- A community event for security researchers to share their favorite notebooks☆107Updated last year
- Repository of public reference frameworks for the DFIR community.☆116Updated last year
- Practical Threat Detection Engineering, Published by Packt☆68Updated last year
- Reference sheet for Threat Hunting Professional Course☆25Updated 6 years ago
- Python library for threat intelligence☆86Updated 3 months ago
- Tool to extract indicators of compromise from security reports in PDF format☆72Updated 10 months ago
- Web application to create indexes for GIAC certification examinations.☆138Updated 2 years ago
- Tool used to perform threat intelligence against packet data☆35Updated 2 months ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆149Updated last month
- ☆77Updated 5 years ago
- ☆69Updated 3 weeks ago
- The ICS Advisory Project is an open-source project to provide DHS CISA ICS Advisories data in Comma Separated Value (CSV) format to suppo…☆81Updated last week
- Useful network monitoring, analysis, and active response tools used or mentioned in the SANS SEC503 course (https://www.sans.org/course/i…☆223Updated 3 months ago
- Convert Sigma rules to Wazuh rules☆64Updated last year
- ☆45Updated last year
- Random notes collected on the intertubes relating to DFIR☆32Updated last year
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆61Updated last year
- Industrial Control Systems Network Protocol Parsers☆168Updated 3 months ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆28Updated this week
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆44Updated 3 years ago
- Dovehawk is a Zeek module that automatically imports MISP indicators and reports Sightings☆123Updated 3 years ago
- Configuration Hardening Assessment PowerShell Script (CHAPS)☆179Updated last week