Highlights
- Pro
-
-
malware_training_vol1 Public
Forked from hasherezade/malware_training_vol1Materials for Windows Malware Analysis training (volume 1)
-
DataAnalysisWithPythonAndPySpark Public
Forked from jonesberg/DataAnalysisWithPythonAndPySparkCode repository for the "PySpark in Action" book
Python UpdatedFeb 13, 2023 -
DataAnalysisWithPythonAndPySpark-Data Public
Forked from jonesberg/DataAnalysisWithPythonAndPySpark-DataData for the `Data Analysis with Python and PySpark` book
UpdatedJan 9, 2023 -
ipython-magics Public
Forked from secureworks/infosec-jupyterthon-2022-ipython-magicsSecureWorks' Infosec Jupyterthon IPython Magics talk
Jupyter Notebook Apache License 2.0 UpdatedDec 2, 2022 -
forensic_as_code Public
Forked from b4stet/forensic_as_codeperegrinations at the frontier of forensic and data science
Jupyter Notebook UpdatedNov 4, 2022 -
Spartacus Public
Forked from Accenture/SpartacusSpartacus DLL Hijacking Discovery Tool
-
Cheat-Sheets Public
Cheat sheets for threat hunting, detection and other stuff.
-
Microsoft-M365D-Hunting-Queries Public
Forked from microsoft/Microsoft-365-Defender-Hunting-QueriesSample queries for Advanced hunting in Microsoft Threat Protection
-
Blue_Teams_Course Public
Forked from Stijnvhd/Blue_Teams_CourseJupyter Notebook Apache License 2.0 UpdatedAug 16, 2022 -
labs_modern_malware_c2 Public
Forked from ps-interactive/labs_modern_malware_c2labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.
-
fr0ggers-jupyter-collection Public
Forked from fr0gger/jupyter-collectionCollection of Jupyter Notebooks by @fr0gger_
HTML UpdatedAug 12, 2022 -
Streamlit_Course Public
Forked from Stijnvhd/Streamlit_CourseHere you can find all the material for the O'Reilly Streamlit Course
Python MIT License UpdatedAug 2, 2022 -
RITA-J Public
Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.
-
TripleCross Public
Forked from h3xduck/TripleCrossA Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.
-
ds4n6_lib Public
Forked from ds4n6/ds4n6_libLibrary of functions to apply Data Science in several forensics artifacts
Python GNU General Public License v3.0 UpdatedJun 22, 2022 -
socbed Public
Forked from fkie-cad/socbedA Self-Contained Open-Source Cyberattack Experimentation Testbed
-
-
Real-CyberSecurity-Datasets Public
Forked from gfek/Real-CyberSecurity-DatasetsPublic datasets to help you address various cyber security problems.
4 UpdatedMar 28, 2022 -
cobaltstrike-beacon-data Public
Forked from fox-it/cobaltstrike-beacon-dataOpen Dataset of Cobalt Strike Beacon metadata (2018-2022)
Jupyter Notebook UpdatedMar 28, 2022 -
-
attack-flow Public
Forked from center-for-threat-informed-defense/attack-flowATT&CK Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flow…
-
-
azure-kql Public
Azure KQL (Kusto Query Language) tips, tricks and best practices for Threat Hunting, Blue Teaming, etc.
-
ADExplorerSnapshot.py Public
Forked from c3c/ADExplorerSnapshot.pyADExplorerSnapshot.py is an AD Explorer snapshot ingestor for BloodHound.
Python UpdatedDec 29, 2021 -
easyBEATS Public
Forked from Frichetten/easyBEATSBeats for Raspberry Pi / ARM
Shell Apache License 2.0 UpdatedDec 18, 2021 -
Invoke-Bof Public
Forked from airbus-cert/Invoke-BofLoad any Beacon Object File using Powershell!
PowerShell Apache License 2.0 UpdatedDec 9, 2021 -
infosec-jupyterthon Public template
Forked from OTRF/infosec-jupyterthonA community event for security researchers to share their favorite notebooks
Jupyter Notebook GNU General Public License v3.0 UpdatedDec 6, 2021 -
c9-python-getting-started Public
Forked from microsoft/c9-python-getting-startedSample code for Channel 9 Python for Beginners course
Jupyter Notebook MIT License UpdatedNov 22, 2021 -