Resources from the Security Presentation
☆13Oct 29, 2024Updated last year
Alternatives and similar repositories for SecurityPresentation
Users that are interested in SecurityPresentation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- Scrape pastes from pastebin and archive them for review☆17Mar 6, 2019Updated 7 years ago
- FIles and guides related to using Elasticstack as a SIEM☆12May 16, 2020Updated 5 years ago
- Generate audio-reactive keyframe strings for AI animation notebooks☆13Jul 10, 2022Updated 3 years ago
- ☆29Aug 9, 2016Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- String extraction and classification tool for binary files, designed to extract only the strings that can be considered relevant (i.e. no…☆11Aug 9, 2020Updated 5 years ago
- Forensics Science Education☆11Apr 26, 2021Updated 4 years ago
- ☆21Nov 7, 2023Updated 2 years ago
- ☆32Oct 11, 2023Updated 2 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Jul 23, 2020Updated 5 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- ☆18Oct 20, 2021Updated 4 years ago
- This config file will automatically convert a temporary Windows Sandbox environment into a Flare VM for malware analysis.☆11Jan 3, 2025Updated last year
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆15Aug 15, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- This is the official repository for Basic Malware Analysis Course☆20Jan 11, 2022Updated 4 years ago
- Windows log and threat hunting with powershell☆16Dec 11, 2020Updated 5 years ago
- Collection of scripts and tools related to the eCTHPv2 exam by INE.☆19Jun 12, 2022Updated 3 years ago
- Cloud threat detection visualization from excalidraw☆12Apr 25, 2022Updated 3 years ago
- JetBrains Academy projects☆14Oct 15, 2020Updated 5 years ago
- macos-collector - Automated Collection of macOS Forensic Artifacts for DFIR☆37Mar 16, 2026Updated last week
- My current HomeLab Setup and other cool things I'm interested in!☆55Sep 14, 2024Updated last year
- Simulates a compromise in a cloud and container environment☆34Dec 18, 2024Updated last year
- Tactics, Techniques, and Procedures☆28Jan 20, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Simplified MITRE Use Cases, it describes the Attack and Detection☆49Sep 29, 2020Updated 5 years ago
- This repository contains a proof-of-concept exploit written in C++ that demonstrates the exploitation of a vulnerability affecting the Wi…☆77Mar 13, 2024Updated 2 years ago
- ☆17Aug 27, 2022Updated 3 years ago
- ☆18Dec 23, 2024Updated last year
- This repository is created to add value to existing Network Security Monitoring solutions.☆17Sep 30, 2016Updated 9 years ago
- High-level Threat Intelligence playbooks☆20Mar 6, 2021Updated 5 years ago
- Spreading the word of: https://github.com/imrk51/CEH-v11-Study-Guide☆17Nov 3, 2022Updated 3 years ago
- SigmaHQ pySigma CrowdStrike processing pipeline☆29Nov 30, 2025Updated 3 months ago
- ☆20Jan 20, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆20Oct 9, 2024Updated last year
- Legacy Sigma Tools (sigmac etc.)☆16May 7, 2023Updated 2 years ago
- CVE-2018-9276 PRTG < 18.2.39 Reverse Shell (Python3 support)☆20Dec 22, 2022Updated 3 years ago
- ☆22Mar 1, 2022Updated 4 years ago
- Detecting Cobalt Strike Team Servers on targets through traffic telemetry.☆22Aug 13, 2024Updated last year
- Audit Powershell and search from known keywords in history #Blueteam☆25Apr 22, 2020Updated 5 years ago
- Mapping your datasources and detections to the MITRE ATT&CK Navigator framework.☆60May 25, 2020Updated 5 years ago