qeeqbox / reports
Recent cyber attacks reports & interesting analysis files
☆15Updated 2 years ago
Alternatives and similar repositories for reports:
Users that are interested in reports are comparing it to the libraries listed below
- Pure Honeypots with an automated bash script☆19Updated 3 years ago
- A MITRE ATT&CK Lookup Tool☆45Updated 9 months ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆45Updated 3 years ago
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆91Updated 2 years ago
- ☆14Updated 4 years ago
- Custom security distro for remote penetration testing☆52Updated 3 years ago
- Cheat sheets for threat hunting, detection and other stuff.☆33Updated 2 years ago
- All the useful tools interesting to be used☆23Updated 2 years ago
- Cyber Threats Detection Rules☆14Updated last month
- Virus Total Free - IOC parser and report generator☆23Updated last year
- Simple Script to Help You Find All Files Has Been Modified, Accessed, and Created In A Range Time.☆27Updated 2 years ago
- Threat Hunter's Knowledge Base☆22Updated 3 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Updated 4 years ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 3 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- ☆41Updated 9 months ago
- ☆21Updated 3 years ago
- ☆11Updated 4 years ago
- A collection of attacks metadata that were used in my previous pen-test tools☆17Updated 2 years ago
- Sigma detection rules for hunting with the threathunting-keywords project☆52Updated this week
- Send High & New Incidents to The Hive incident management Platform☆18Updated 3 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- Random tips and tricks RE: ransomware☆14Updated 3 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆36Updated last year
- Reference sheet for Threat Hunting Professional Course☆25Updated 5 years ago
- Random notes collected on the intertubes relating to DFIR☆32Updated last year
- gundog - guided hunting in Microsoft Defender☆52Updated 3 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Updated 2 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- This script provides a Python library with methods to authenticate to various sources of threat intelligence and query IPs for the latest…☆18Updated 2 years ago