3CORESec / MAL-CLLinks
MAL-CL (Malicious Command-Line)
☆320Updated 2 years ago
Alternatives and similar repositories for MAL-CL
Users that are interested in MAL-CL are comparing it to the libraries listed below
Sorting:
- Threat Hunting tool about Sysmon and graphs☆335Updated 2 years ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆341Updated last week
- A python script developed to process Windows memory images based on triage type.☆265Updated 2 years ago
- #ThreatHunting #DFIR #Malware #Detection Mind Maps☆305Updated 4 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆208Updated 3 years ago
- A repository of DFIR-related Mind Maps geared towards the visual learners!☆541Updated 3 years ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆172Updated last year
- ☆195Updated last year
- Public Repo for Atomic Test Harness☆282Updated 8 months ago
- Misc Threat Hunting Resources☆375Updated 2 years ago
- Sysmon EDR POC Build within Powershell to prove ability.☆225Updated 4 years ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆251Updated last month
- ☆131Updated last year
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆189Updated 3 years ago
- Blueteam operational triage registry hunting/forensic tool.☆150Updated 3 months ago
- Rules generated from our investigations.☆202Updated 5 months ago
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆156Updated 4 years ago
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆635Updated last year
- Live forensic artifacts collector☆173Updated last year
- Ransomware simulator written in Golang☆460Updated 3 years ago
- Incident Response collection and processing scripts with automated reporting scripts☆316Updated last year
- ☆513Updated last year
- This script is made to collect the most valiable artifacts for foreniscs or incident reponse investigation rather than imaging the whole …☆207Updated 5 years ago
- Some Threat Hunting queries useful for blue teamers☆131Updated 3 years ago
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆322Updated 7 months ago
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆600Updated this week
- Repository of attack and defensive information for Business Email Compromise investigations☆269Updated 7 months ago
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆137Updated last year
- Signatures and IoCs from public Volexity blog posts.☆361Updated last week
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆141Updated last year