vernjan / ctf-writeupsLinks
Solutions for CTFs
☆16Updated 5 months ago
Alternatives and similar repositories for ctf-writeups
Users that are interested in ctf-writeups are comparing it to the libraries listed below
Sorting:
- Repository resource for threat hunter☆158Updated 7 years ago
- Run several volatility plugins at the same time☆115Updated 2 years ago
- Creation of a laboratory for malware analysis in AWS☆104Updated 2 years ago
- CTFs as you need them☆29Updated 2 years ago
- SIEM Cheat Sheet☆76Updated 2 years ago
- ☆17Updated 7 months ago
- Jupyter Notebooks for the Blue Team☆36Updated 9 months ago
- Useful resources about phishing email analysis☆87Updated 8 months ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆164Updated 11 months ago
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆106Updated last year
- A course on "Digital Forensics" designed and offered in the Computer Science Department at Texas Tech University☆194Updated 2 years ago
- Collection of created MindMaps☆151Updated last year
- Malicious PDF files recently considered one of the most dangerous threats to the system security. The flexible code-bearing vector of the…☆222Updated 3 years ago
- SANS Slingshot Linux Distribution☆54Updated 4 years ago
- Practice Labs☆100Updated 4 years ago
- links collected from SOC Core Skills class☆85Updated 4 years ago
- Jupyter Notebooks for the Blue Team☆146Updated 6 months ago
- Open Threat Hunting Framework☆120Updated 2 years ago
- ☆67Updated last month
- A curated list of FOSS software appliances for building a SOC☆18Updated 4 years ago
- Threat-Intelligence Feeds & Tools & Frameworks☆219Updated last year
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆119Updated 3 years ago
- ☆15Updated 5 years ago
- Collection of resources that are made by the Malware Research community☆234Updated 2 years ago
- This repository contain all virtual vulnerable machine. These vulnerable machine are Window and Linux based.☆119Updated 6 years ago
- Showcase of DNS Exfiltration and Infiltration☆51Updated 4 years ago
- Some Threat Hunting queries useful for blue teamers☆129Updated 3 years ago
- Malware Analysis Techniques, published by Packt☆76Updated 2 years ago
- Cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for them☆28Updated last year
- list of useful commands, shells and notes related to OSCP☆80Updated 7 years ago