0x706972686f / RMM-CatalogueView external linksLinks
☆105Jul 5, 2025Updated 7 months ago
Alternatives and similar repositories for RMM-Catalogue
Users that are interested in RMM-Catalogue are comparing it to the libraries listed below
Sorting:
- Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations☆103Aug 15, 2025Updated 6 months ago
- A list of RMMs designed to be used in automation to build alerts☆117Nov 9, 2025Updated 3 months ago
- ☆14Mar 9, 2023Updated 2 years ago
- Rules generated from our investigations.☆204Jun 17, 2025Updated 8 months ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- General Content☆25Dec 23, 2025Updated last month
- Offensive Research Guide to Help Defense Improve Detection☆32Jan 27, 2023Updated 3 years ago
- ShellSweeping the evil.☆53Jun 18, 2024Updated last year
- Scripts to for ready-to-use Velociraptor instance deployment in Azure☆14Jun 27, 2023Updated 2 years ago
- ☆11Jun 12, 2023Updated 2 years ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Microsoft 365 Advanced Hunting Queries with hotlinks that plug the query right into your tenant.☆132Feb 10, 2026Updated last week
- Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.☆214Updated this week
- A repository to share publicly available Velociraptor detection content☆196Updated this week
- Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant data☆13Jul 16, 2019Updated 6 years ago
- LILO based Pulse Secure appliance disk image decryptor☆13Mar 20, 2024Updated last year
- Finding ClickFix and FakeCAPTCHA like it's 1999☆121Updated this week
- Documentation and scripts to properly enable Windows event logs.☆672Oct 3, 2025Updated 4 months ago
- Repository where I hold random detection and threat hunting queries that I come up with based on different sources of information (or eve…☆277Dec 20, 2025Updated last month
- ☆22Jul 7, 2023Updated 2 years ago
- KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunt…☆1,634Updated this week
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆167Dec 7, 2025Updated 2 months ago
- ☆17Jan 22, 2026Updated 3 weeks ago
- A WDAC configuration repository with the sole intention of enriching MDE☆30Jun 18, 2025Updated 7 months ago
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆89Feb 9, 2025Updated last year
- Windows Forensics Salt States☆21Updated this week
- Common framework for designing a detection and response framework for the most common MFT solutions☆16Aug 4, 2023Updated 2 years ago
- A python package that helps with analysis of MSI files☆14Mar 28, 2021Updated 4 years ago
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆800Jan 14, 2026Updated last month
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆342Dec 3, 2025Updated 2 months ago
- Welcome to the SEKOIA.IO Community repository!☆178Feb 6, 2026Updated last week
- Public Repo for Atomic Test Harness☆283Apr 8, 2025Updated 10 months ago
- DFIQ is a collection of investigative questions and the approaches for answering them☆301Jan 17, 2025Updated last year
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Jan 26, 2022Updated 4 years ago
- A PowerShell module for acquisition of data from Microsoft 365 and Azure for Incident Response and Cyber Security purposes.☆765Jan 15, 2026Updated last month
- Google Filestream Forensic Tool☆22Mar 10, 2022Updated 3 years ago
- ☆21May 8, 2022Updated 3 years ago
- ☆54May 14, 2024Updated last year
- Effort to list and aggregate known malicious Google Chrome Extension IDs☆60Nov 26, 2022Updated 3 years ago