Here is a list of resources broken down by topic that I either reference, use, or have researched.
AI Tools and models
Many different GPTs available for a wide array of tasks.
Your friendly assistant. Fast, capable, and truly conversational.
Generates images based on prompts.
Various Cybersecurity Resources
Analyse suspicious files, domains, IPs and URLs to detect malware and other breaches, automatically share them with the security community.
This is a free malware analysis service for the community that detects and analyzes unknown threats using a unique Hybrid Analysis technology
YARA is a multi-platform program running on Windows, Linux and Mac OS X.
IDA Pro as a disassembler is capable of creating maps of their execution to show the binary instructions that are actually executed by the processor in a symbolic representation.
Zero Miss for Office Malware Threats
Immunity Debugger is a dynamic analysis tool that allows executables to be analyzed at the assembly language level with reverse engineering techniques.
Hands-on SOC Analyst training
The Splunk Attack Range is an open-source project maintained by the Splunk Threat Research Team. It builds instrumented cloud and local environments, simulates attacks, and forwards the data into a Splunk instance.
The goal of this project is to provide the red and blue teams with the ability to deploy an ad-hoc detection lab to test various attacks and forensic artifacts on the latest Windows environment and then to get a 'SOC-like' view into generated data.
It will list MX records for a domain in priority order.
Great tool for monitoring the system and detecting suspicious situations. It’s also free.
Procmon tool is a useful tool that provides real-time information by monitoring the activities of processes on Windows.
https://learn.microsoft.com/tr-tr/sysinternals/downloads/procmon
Volatility is a tool that enables the analysis of memory dumps taken from a compromised machine during the incident response process.
Wireshark is a tool that allows capturing, analyzing, and recording network packets passing through network interfaces on the system.
It gives you the history of different browsers in one table.
Tools listed are just resources and no guarantee of your safety or usefulness of tools is implied. Use at your own risk.
Sign up to get summaries and communications!
Copyright © 2024 Jason Britton - All Rights Reserved.
Powered by AI