3gbCyber / User_Accounts_HuntingLinks
The scrip will help you to find some values info for the user that you need as DFIR
☆16Updated 3 years ago
Alternatives and similar repositories for User_Accounts_Hunting
Users that are interested in User_Accounts_Hunting are comparing it to the libraries listed below
Sorting:
- Repository of public reference frameworks for the DFIR community.☆121Updated 2 years ago
- Script to automate Linux live evidence collection☆28Updated 3 years ago
- User Feedback Space of #MitreAssistant☆38Updated 2 years ago
- ☆65Updated 4 months ago
- A script that updates KAPE (using Get-KAPEUpdate.ps1) as well as EZ Tools (within .\KAPE\Modules\bin) and the ancillary files that enhanc…☆59Updated 7 months ago
- ☆21Updated 3 years ago
- Random notes collected on the intertubes relating to DFIR☆35Updated 2 years ago
- Library of threat hunts to get any user started!☆48Updated 5 years ago
- A repo to centralize some of the regular expressions I've found useful over the course of my DFIR career.☆106Updated 3 years ago
- Jupyter notebooks for threat hunting☆60Updated 10 months ago
- Collection of scripts provided for public use☆38Updated last week
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆127Updated 2 years ago
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆68Updated last year
- ☆14Updated last year
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Updated 4 years ago
- A curated list of KAPE-related resources☆179Updated 9 months ago
- ☆68Updated 2 months ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆69Updated last year
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆51Updated last year
- This repository contains helper scripts and custom configs to get the best out of Google's Timesketch project.☆118Updated 2 years ago
- ☆33Updated 4 years ago
- The Threat Actor Profile Guide for CTI Analysts☆116Updated 2 years ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆117Updated 2 years ago
- ☆35Updated last year
- ☆22Updated 3 years ago
- Information about the open-source-dfir slack community☆30Updated 2 years ago
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆89Updated last year
- Cyber Underground General Intelligence Requirements☆97Updated 2 years ago
- macOS Artifacts☆33Updated 11 months ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆45Updated 4 years ago