packetrat / packethuntingLinks
Resources and materials for DEF CON 2018 Packet Hunting Workshop
☆79Updated 7 years ago
Alternatives and similar repositories for packethunting
Users that are interested in packethunting are comparing it to the libraries listed below
Sorting:
- Prepare, Hunt, and Respond - Conceptual model against cyber attacks by JYVSECTEC☆61Updated 3 years ago
- SEC599 supporting GitHub repository☆16Updated 6 years ago
- Repository for my ATT&CK analysis research.☆69Updated 6 years ago
- Generate ATT&CK Navigator layer file from PowerShell Empire agent logs☆48Updated 7 years ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- Understanding ATT&CK Matrix for Enterprise☆81Updated 7 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 7 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- Repository for Endpoint Security Testing☆35Updated 7 years ago
- ☆76Updated 7 years ago
- ☆53Updated 7 years ago
- A powershell script for creating a Windows honeyport.☆90Updated 7 months ago
- PowerShell No Agent Hunting☆109Updated 7 years ago
- Sysmon config for both Windows and Linux Devices. Windows one is a bit dated☆56Updated last year
- Splunk App to assist Sysmon Threat Hunting☆38Updated 8 years ago
- BTG's purpose is to make fast and efficient search on IOC☆71Updated 6 years ago
- No-Script Automation Tool☆56Updated 7 years ago
- Simulating Adversary Operations☆96Updated 7 years ago
- A collection of infosec related scripts and information.☆53Updated last year
- A collection of typical false positive indicators☆55Updated 4 years ago
- ☆108Updated 8 years ago
- Detecting Lateral Movement with Machine Learning☆139Updated 8 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 8 years ago
- PowerGRR is an API client library in PowerShell working on Windows, Linux and macOS for GRR automation and scripting.☆57Updated 3 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated 2 years ago
- Credential Phish Analysis and Automation☆97Updated 7 years ago
- All materials from our Black Hat 2018 "Subverting Sysmon" talk☆135Updated 7 years ago
- ☆52Updated 7 years ago
- Scoring Engine for CTF competitions☆48Updated 2 years ago
- Tools for the Computer Incident Response Team☆147Updated 8 years ago