0xMo's Stars
HackingLZ/ExtractedDefender
blackorbird/APT_REPORT
Interesting APT Report Collection And Some Special IOC
Baniur/Forensic-Artifacts
Repository of forensic artifacts which are useful in real world and CTF investigations
Baniur/Writeups
Write-ups for CTF-like, CyberSec training platforms (BTLO, CyberDefenders, Hack The Box Sherlocks)
blocklistproject/Lists
Primary Block Lists
securityjoes/MasterParser
MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs
simsong/bulk_extractor
This is the development tree. Production downloads are at:
mikeroyal/Digital-Forensics-Guide
Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
center-for-threat-informed-defense/security-stack-mappings
🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as an archive.
fs4xz/Threat-Hunting
eCTHPv2 certification course provided by CyberHub sponsorship of the SAFCSP
beahunt3r/Windows-Hunting
ine-labs/ThreatSeeker
ThreatSeeker: Threat Hunting via Windows Event Logs
Yamato-Security/hayabusa
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
LetsDefend/incident-response-playbooks
Sam0x90/CB-Threat-Hunting
CarbonBlack EDR detection rules and response actions
cyb3rmik3/KQL-threat-hunting-queries
A repository of KQL queries focused on threat hunting and threat detecting for Microsoft Sentinel & Microsoft XDR (Former Microsoft 365 Defender).
tomwechsler/Active_Directory_Advanced_Threat_Hunting
This repo is about Active Directory Advanced Threat Hunting
codeyourweb/fastfinder
Incident Response - Fast suspicious file finder
MHaggis/hunt-detect-prevent
Lists of sources and utilities utilized to hunt, detect and prevent evildoers.
SoulSec/resource-threat-hunting
Repository resource for threat hunter
bluecapesecurity/PWF
Practical Windows Forensics Training
matro7sh/BypassAV
This map lists the essential techniques to bypass anti-virus and EDR
0xzeta/HowToHunt
Tutorials and Things to Do while Hunting Vulnerability.
rabobank-cdc/DeTTECT
Detect Tactics, Techniques & Combat Threats
Bert-JanP/Hunting-Queries-Detection-Rules
KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
MazX0p/WmiEye
Ignitetechnologies/Mindmap
This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them
ihebski/A-Red-Teamer-diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
A-poc/BlueTeam-Tools
Tools and Techniques for Blue Team / Incident Response
A-poc/RedTeam-Tools
Tools and Techniques for Red Team / Penetration Testing