Field reference for BTL1 and Tier 1 SOC work — grep-ready cheatsheets, SPL queries, Volatility workflows, live response commands
-
Updated
Mar 16, 2026 - HTML
Field reference for BTL1 and Tier 1 SOC work — grep-ready cheatsheets, SPL queries, Volatility workflows, live response commands
Curated Blue Team toolkit for defensive cybersecurity: asset discovery, vulnerability management, network monitoring, DFIR, threat intelligence, cryptography, endpoint security and SIEM/log management.
Email Header Forensics Lab is a desktop application for inspecting, generating, editing, and analyzing email headers in controlled environments for forensic analysis, security research, and authentication testing.
Phishing email investigation with full header analysis, link inspection, red-flag detection.
SOC-focused phishing investigation lab demonstrating OSINT analysis, IOC extraction, domain intelligence validation, and MITRE ATT&CK mapping.
Comprehensive phishing incident response simulation with email forensics, threat intelligence enrichment, and NIST-aligned playbook
Phishing triage analysis of a real Sneaky2FA AiTM campaign targeting Microsoft 365. Documents the full attack chain, IOC extraction, evasion techniques, and sandbox vs reputation tool detection gap.
WORK IN PROGRESS... Modular SOC analyst toolkit with phishing email analyzer, log parser, and IOC extractor. Built with FastAPI + React, integrates VirusTotal, AbuseIPDB, Shodan, URLScan.io, and AlienVault OTX APIs
Hands on analysis and defending against phishing emails. Investigating real-world phishing attempts using a variety of techniques.
Simulation and analysis of phishing emails — headers, payloads, and attacker techniques.
Phishing Email & URL Analyzer — Python tool that checks URLs and emails for phishing indicators, scores them 0-100, and generates professional HTML reports with detailed findings.
Blue Team investigations including browser threat hunting, phishing analysis, and SIEM alert triage. Saviva~
Phishing analysis lab using PhishTank, VirusTotal, MXToolbox, and PhishTool to investigate 3 live phishing URLs and 2 phishing emails targeting cryptocurrency users. Covers URL analysis, email header analysis, SPF/DKIM/DMARC authentication, and campaign correlation.
Investigation of a suspected phishing email, analysing headers, links, and indicators of compromise to determine malicious intent.
OSINT-driven analysis of a Trustwallet phishing campaign — infrastructure, lures, and indicators of compromise.
Curated reference for phishing analysis and defense — threat intel feeds, URL/file scanners, email header analysis, sandboxes, IOC workflows, and simulation frameworks.
Cybersecurity portfolio with hands-on blue team, web security, and beginner pentesting projects.
SOC Analyst threat detection lab with log analysis, phishing investigation, MITRE mapping, and incident response documentation.
Executive phishing email analysis for VitalCare Health Solutions – includes header inspection, BEC indicators, SPF/DKIM/DMARC checks, malicious attachment & URL analysis, and a stakeholder-ready executive report with findings, impact, and recommendations.
Enterprise SOC phishing investigation involving Microsoft Defender XDR, QRadar SIEM, CrowdStrike Falcon, IOC analysis, and threat hunting workflows.
Add a description, image, and links to the phishing-analysis topic page so that developers can more easily learn about it.
To associate your repository with the phishing-analysis topic, visit your repo's landing page and select "manage topics."