rj-chap / CFWorkshop
Understanding and analyzing carrier files workshop repo
☆48Updated 5 years ago
Alternatives and similar repositories for CFWorkshop:
Users that are interested in CFWorkshop are comparing it to the libraries listed below
- Random notes collected on the intertubes relating to DFIR☆32Updated last year
- Hunt malware with Volatility☆47Updated 8 months ago
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆25Updated 9 months ago
- ☆41Updated 4 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆44Updated 3 years ago
- Scripts to facilitate filtering with Plaso☆125Updated 4 years ago
- Collection of scripts provided for public use☆34Updated 2 months ago
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆77Updated 3 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆57Updated 2 weeks ago
- My Jupyter Notebooks☆36Updated 9 months ago
- Detection of obfuscated Powershell commands☆54Updated last year
- ☆4Updated 3 months ago
- Web application to create indexes for GIAC certification examinations.☆134Updated last year
- SEC599 supporting GitHub repository☆16Updated 5 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆53Updated 3 years ago
- Collection of useful, up to date, Carbon Black Response Queries☆83Updated 4 years ago
- CSIRT Jump Bag☆27Updated 9 months ago
- ☆77Updated 5 years ago
- Digital Forensics Artifacts Knowledge Base☆76Updated 8 months ago
- Logbook for Digital Forensics and Incident Response☆50Updated 6 months ago
- A repo to support the book☆104Updated 3 years ago
- ☆28Updated 4 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin …☆155Updated 2 years ago
- Let's obscure some IPv4 addresses☆36Updated 2 years ago
- ☆85Updated 11 months ago
- ☆32Updated 3 months ago
- A repo to document API functions mapped to security events across diverse platforms☆74Updated 5 years ago
- How to ARM Yourself - Bsides Tampa 2020☆14Updated 4 years ago
- The Windows Malware Analysis Reversing Core Tools☆90Updated 4 years ago
- Powershell sandboxing utility☆17Updated 3 weeks ago