surya4n6 / dc29-btv-2021
☆14Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for dc29-btv-2021
- ☆43Updated last month
- A repo to support the book☆103Updated 3 years ago
- This repo is where I store my Threat Hunting ideas/content☆85Updated last year
- A collection of Powershell scripts that will help automate the build process for a Marvel domain.☆144Updated 8 months ago
- ☆24Updated last year
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 6 months ago
- ☆46Updated last year
- DEFCON 31 slide deck and video link☆57Updated 4 months ago
- Random tips and tricks RE: ransomware☆14Updated 3 years ago
- Active Directory Purple Team Playbook☆104Updated last year
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆75Updated 3 years ago
- ☆28Updated 4 years ago
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆94Updated last year
- Full of public notes and Utilities☆87Updated this week
- A tool to display Windows Event logs as they happen.☆12Updated last year
- ☆40Updated 3 years ago
- ☆34Updated 8 months ago
- ☆72Updated this week
- ☆61Updated 3 years ago
- The ultimate solution for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆22Updated 3 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆59Updated 3 weeks ago
- My Jupyter Notebooks☆36Updated 7 months ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆109Updated 11 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆59Updated 4 months ago
- ☆41Updated last month
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆56Updated last week
- Baseline a Windows System against LOLBAS☆25Updated 6 months ago
- Cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for them☆26Updated 8 months ago
- The Github project for The Defender's Guide by Luke Paine and Jonathan Johnson☆145Updated last year