qeeqbox / reports
Recent cyber attacks reports & interesting analysis files
β15Updated 2 years ago
Related projects β
Alternatives and complementary repositories for reports
- A MITRE ATT&CK Lookup Toolβ43Updated 6 months ago
- 𧬠Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)β86Updated 2 years ago
- Pure Honeypots with an automated bash scriptβ19Updated 3 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)β45Updated 3 years ago
- Cyber Threats Detection Rulesβ13Updated 2 months ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.β32Updated 4 years ago
- β14Updated 3 years ago
- Sniffing out well-known threat groupsβ28Updated 3 months ago
- Yara scan Phishing Kit's Zip archive(s)β54Updated 7 months ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.β34Updated 2 years ago
- Virus Total Free - IOC parser and report generatorβ22Updated last year
- Send High & New Incidents to The Hive incident management Platformβ17Updated 3 years ago
- Reference sheet for Threat Hunting Professional Courseβ25Updated 5 years ago
- AIL project training materialsβ24Updated 2 months ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigationsβ43Updated 3 years ago
- β41Updated 7 months ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry Nβ¦β19Updated 3 months ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online toolsβ26Updated 4 years ago
- Simple Script to Help You Find All Files Has Been Modified, Accessed, and Created In A Range Time.β27Updated last year
- Incident Response Network Toolsβ23Updated 3 years ago
- A script to assist in processing forensic RAM captures for malware triageβ27Updated 3 years ago
- Threat Hunter's Knowledge Baseβ22Updated 2 years ago
- Lokix Platform is a free open-source solution to help blue teams and threat hunters use Loki Scanner to sweep enterprise networksβ25Updated 4 years ago
- This directory contains presentations and related materials of my speaking engagements. I also use this to record historical presentationβ¦β14Updated 7 months ago
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.β34Updated 2 years ago
- Library of threat hunts to get any user started!β40Updated 4 years ago
- Sharing Threat Hunting runbooksβ24Updated 5 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.β38Updated 2 years ago
- Sigma detection rules for hunting with the threathunting-keywords projectβ47Updated 2 weeks ago