CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable reports …
CTI Expert — Cyber Threat Intelligence & OSINT analysis skill for Claude Code. 67+ commands, 35 techniques, no API keys required.
This is a collection of RATs for educational purposes
Curated manuals, playbooks, and checklists for OSINT, OPSEC, cyber security, and digital investigations
A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.
A list of cyber-chef recipes and curated links
CyberScan: Network's Forensics ToolKit
Some useful books related to Cybersecurity, Linux and more.
List of some cybersecurity conferences
⚠️ Education and Certification are Optional
Cybersecurity Notes For Intermediate and Advanced Hackers | CEH Exam Prep Also Included
A collection of resources for Threat Hunters
DC3 Malware Configuration Parser (DC3-MWCP) is a framework for parsing configuration information from malware. The information extracted fro…
Enhanced version of dd for forensics and security
This repo aims to help you decipher the UAL from a Digital Forensics & Incident Response (DFIR) perspective. The UAL is the Microsoft 365 Un…
Deep Learning models for network traffic classification
Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".
Extracted Yara rules from Windows Defender mpavbase and mpasbase
Powershell script deobfuscation using AST in Python
Scam intelligence, phishing attribution, drainer mapping. Legal OSINT only. Public data. Real cases. For researchers and victims.
Program for determining types of files for Windows, Linux and MacOS.
Cheat sheet to detect and remove linux kernel rootkit
This is a repository dedicated to the DFIR journey. Contains notes, reflections and links to tools.
Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-forens…