pan-unit42 / Wireshark-quizzes
Packet captures of malicious traffic for analysis using Wireshark
☆54Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Wireshark-quizzes
- pcaps of traffic for traffic analysis workshop☆78Updated 3 years ago
- Initial triage of Windows Event logs☆89Updated 5 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆62Updated 2 years ago
- A specification and style guide for YARA rules☆37Updated 9 months ago
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆57Updated 6 months ago
- Re-play Adversarial Techniques☆26Updated 3 years ago
- BlackBerry Threat Research & Intelligence☆93Updated last year
- yara detection rules for hunting with the threathunting-keywords project☆87Updated last week
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆73Updated 2 weeks ago
- Detection Engineering with YARA☆85Updated 10 months ago
- A collection of tips for using MISP.☆74Updated 7 months ago
- ☆58Updated 2 years ago
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆94Updated last year
- Sigma rules to share with the community☆115Updated 2 months ago
- Harness the power of Splunk for your investigations☆77Updated last week
- Linux Evidence Acquisition Framework☆113Updated last month
- User Feedback Space of #MitreAssistant☆37Updated last year
- Cyber Underground General Intelligence Requirements☆89Updated 9 months ago
- Forensic Artifact Collection Tool Matrix☆75Updated 2 weeks ago
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆109Updated last year
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆14Updated 6 months ago
- ☆57Updated 3 weeks ago
- A repository of my own Sigma detection rules.☆156Updated 2 months ago
- ☆62Updated this week
- Full of public notes and Utilities☆87Updated last week
- Open Threat Hunting Framework☆103Updated last year
- Open IOC sharing platform☆53Updated 2 weeks ago
- pySigma Splunk backend☆34Updated 7 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆110Updated 7 months ago