Popular repositories Loading
-
Threat-Hunting-with-WebProxy-Logs-using-Pandas---Jupyter-Notebook
Threat-Hunting-with-WebProxy-Logs-using-Pandas---Jupyter-Notebook Public -
ExtractLOLBin
ExtractLOLBin PublicScript is written to fetch LOLBin Details from Security and Sysmon EVTX file.
-
Similar-looking-domain-detection-using-python-fuzzywuzzy
Similar-looking-domain-detection-using-python-fuzzywuzzy PublicMajor cause of phishing and BEC incident is similar looking domain, if you detect it early, you can prevent incidents early, python fuzzywuzzy module let you do that
Python 2
-
Playing-with-Process-Data-of-10k-Malware-Sample
Playing-with-Process-Data-of-10k-Malware-Sample PublicPurpose of this analysis is to understand the common behavior seen like locations from where malware runs, commonly used LOLBins, processes that communicate with internet and some hunting
Python 1
-
Linux-Forensics-Tools-Capabilities
Linux-Forensics-Tools-Capabilities PublicThis repository contains simple CSV file which list the artifacts gather by Linux forensic tools
If the problem persists, check the GitHub status page or contact support.