Field reference for BTL1 and Tier 1 SOC work — grep-ready cheatsheets, SPL queries, Volatility workflows, live response commands
-
Updated
Mar 16, 2026 - HTML
Field reference for BTL1 and Tier 1 SOC work — grep-ready cheatsheets, SPL queries, Volatility workflows, live response commands
Curated Blue Team toolkit for defensive cybersecurity: asset discovery, vulnerability management, network monitoring, DFIR, threat intelligence, cryptography, endpoint security and SIEM/log management.
Email Header Forensics Lab is a desktop application for inspecting, generating, editing, and analyzing email headers in controlled environments for forensic analysis, security research, and authentication testing.
Phishing email investigation with full header analysis, link inspection, red-flag detection.
Comprehensive phishing incident response simulation with email forensics, threat intelligence enrichment, and NIST-aligned playbook
SOC-focused phishing investigation lab demonstrating OSINT analysis, IOC extraction, domain intelligence validation, and MITRE ATT&CK mapping.
Curated reference for phishing analysis and defense — threat intel feeds, URL/file scanners, email header analysis, sandboxes, IOC workflows, and simulation frameworks.
Phishing Email & URL Analyzer — Python tool that checks URLs and emails for phishing indicators, scores them 0-100, and generates professional HTML reports with detailed findings.
Hands on analysis and defending against phishing emails. Investigating real-world phishing attempts using a variety of techniques.
Blue Team investigations including browser threat hunting, phishing analysis, and SIEM alert triage. Saviva~
Cybersecurity portfolio with hands-on blue team, web security, and beginner pentesting projects.
Email header analysis made easy!
Executive phishing email analysis for VitalCare Health Solutions – includes header inspection, BEC indicators, SPF/DKIM/DMARC checks, malicious attachment & URL analysis, and a stakeholder-ready executive report with findings, impact, and recommendations.
Analiza porównawcza skuteczności modeli językowych w wykrywaniu wiadomości phishingowych
Structured SOC investigations including phishing analysis, ransomware intrusion tracking, and multi-stage endpoint compromise documentation.
Add a description, image, and links to the phishing-analysis topic page so that developers can more easily learn about it.
To associate your repository with the phishing-analysis topic, visit your repo's landing page and select "manage topics."