Stars
This demo simulates a SYN flood attack using hping3 on a Kali Linux machine, targeting a victim machine. Suricata detects network anomalies, and Wazuh analyzes logs to trigger alerts, demonstrating…
Consolidation of various resources related to Microsoft Sysmon & sample data/log
Curated list of resources for security Governance, Risk Management, Compliance and Audit professionals and enthusiasts (if they exist).
FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.
This repository is intended for sharing files/tools/tutorials..etc that related to eCPPTv2 from eLearnSecurity
Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It can be used by law enforcement, military, and corporate examiners to invest…
IntelOwl: manage your Threat Intelligence at scale
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Automate the creation of a lab environment complete with security tooling and logging best practices
Educational, CTF-styled labs for individuals interested in Memory Forensics
You didn't think I'd go and leave the blue team out, right?
A collection of open source threat detection rules created by Cyber Castle's team.
Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
Updog is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S, can set ad hoc SSL certificates and use http basic auth.
A communal outpouring of online resources for learning different things in cybersecurity
Mobile Incident Response Book
meirwah / splunk-golang
Forked from sebkl/splunk-golangREST API Client for Splunk