Security Event and Incident Management: A security software that helps recognize and address potential security threats and vulnerabilities.
-
Updated
Aug 6, 2023 - PowerShell
Security Event and Incident Management: A security software that helps recognize and address potential security threats and vulnerabilities.
Analyze domains from Excel list, save status codes, IP addresses and screenshots.
An artificial intelligence (AI) proof of concept (POC) to consume large amounts of Threat Intelligence, parse indicators within a given network environment and produce machine learning (ML) correlation events for a security operations centre (SOC) to analyse.
This script will store the file count and directory size into a log file. This can also be sent to slack.
SOC // Network Analysis // Network Threat Hunting
Some shared yara rules
Academic Project for 6220
Parses and Analyse Authentication on Windows Event Log
List of known RMM tools use by Threat actors
A blog about cyber security and life. coming. soonish.
Config files for my GitHub profile.
Incident Response tools and scripts
OpenSource /Malware Analysis Pipeline System
Digging Deeper in cyber security and threat hunting
YARA signature | YARA rule for Detecting Voldemort Malware
Contain logs collection for Study Case in Threat Hunting (CTF)
The Threat-Intelligence-Lab is a comprehensive platform that empowers organizations to proactively identify, analyze, and combat cyber threats. We provide real-time threat intelligence, advanced threat analysis tools, and expert guidance to help you stay ahead of the curve and protect your valuable data.
Add a description, image, and links to the threat-hunting topic page so that developers can more easily learn about it.
To associate your repository with the threat-hunting topic, visit your repo's landing page and select "manage topics."