pan-unit42 / wireshark-workshop
pcaps of traffic for traffic analysis workshop
☆82Updated 3 years ago
Alternatives and similar repositories for wireshark-workshop:
Users that are interested in wireshark-workshop are comparing it to the libraries listed below
- Packet captures of malicious traffic for analysis using Wireshark☆57Updated last year
- Unit 42 repository hosting packet captures (pcaps) for our series of Wireshark tutorials☆39Updated last year
- ☆67Updated 2 months ago
- Consolidation of various resources related to Microsoft Sysmon & sample data/log☆108Updated 3 years ago
- ☆64Updated 2 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆140Updated last year
- Cast is an installer for any compatible Saltstack based distribution like SIFT or REMnux☆114Updated this week
- A repo hosting the Markua content for the EZ Tools manuals hosted on Leanpub☆65Updated last year
- BlackBerry Threat Research & Intelligence☆98Updated last year
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago
- Creation of a laboratory for malware analysis in AWS☆94Updated 2 years ago
- A curated list of KAPE-related resources☆162Updated 10 months ago
- ☆58Updated 2 years ago
- A repo to centralize some of the regular expressions I've found useful over the course of my DFIR career.☆91Updated 2 years ago
- Incident Response with Threat Intelligence, published by Packt☆52Updated 10 months ago
- Practical Threat Detection Engineering, Published by Packt☆65Updated last year
- Malware Analysis Techniques, published by Packt☆69Updated 2 years ago
- Detection Engineering with YARA☆87Updated last year
- Repository of public reference frameworks for the DFIR community.☆115Updated last year
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆278Updated 6 months ago
- Collection of Jupyter Notebooks by @fr0gger_☆157Updated last week
- Learning by Practising - Hack & Detect - A Practical Guide to Hacking and its Detection via network forensics☆78Updated last year
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆116Updated last year
- The Threat Actor Profile Guide for CTI Analysts☆104Updated last year
- Harness the power of Splunk for your investigations☆92Updated 3 months ago
- Threat Hunting with Elastic Stack, Published by Packt☆39Updated 2 years ago
- Forensic Artifact Collection Tool Matrix☆83Updated 3 months ago
- pcaps for Wireshark tutorial about examining Dridex infection traffic☆16Updated 4 years ago
- Cybersecurity Incident Response Plan☆89Updated 4 years ago
- Tools for simulating threats☆181Updated last year