ANSSI-FR / WAADLinks
Détection d'anomalie à partir des journaux d'authentification Windows
☆18Updated 4 years ago
Alternatives and similar repositories for WAAD
Users that are interested in WAAD are comparing it to the libraries listed below
Sorting:
- Extract BITS jobs from QMGR queue and store them as CSV records☆73Updated 11 months ago
- Yara Based Detection Engine for web browsers☆49Updated 4 years ago
- Configurations for DFIR ORC☆28Updated last year
- PowerSponse is a PowerShell module focused on targeted containment and remediation during incident response.☆40Updated 3 years ago
- evtx2json extracts events of interest from event logs, dedups them, and exports them to json.☆41Updated 4 years ago
- Valhalla API Client☆70Updated 3 weeks ago
- Random hunting ordiented yara rules☆98Updated 2 years ago
- Manipulate timestamps on NTFS☆52Updated 11 years ago
- ☆46Updated 2 years ago
- Automagically extract forensic timeline from volatile memory dump☆132Updated last year
- Carves and recreates VSS catalog and store from Windows disk image.☆100Updated 3 years ago
- A Splunk Technology Add-on to forward filtered ETW events.☆30Updated 5 years ago
- Detect possible sysmon logging bypasses given a specific configuration☆111Updated 7 years ago
- Standardized Malware Analysis Tool☆56Updated 4 years ago
- Malware similarity platform with modularity in mind.☆80Updated 4 years ago
- A YARA Rule Performance Measurement Tool☆61Updated last year
- XOR Key Extractor☆51Updated last year
- Machine Interrogation To Identify Gaps & Techniques for Execution☆33Updated 3 years ago
- Collection of YARA signatures from individual research☆45Updated 2 years ago
- A library for fast parse & import of Windows Eventlogs into Elasticsearch.☆86Updated 7 months ago
- My conference presentations☆87Updated 3 months ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Updated last year
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Updated 4 years ago
- A rewrite of mactime, a bodyfile reader☆39Updated last year
- A sample VHDX file with multiple verbose examples of forensic and anti-forensics artifacts. Meant to be basic and can be expanded upon. P…☆27Updated 3 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆107Updated 3 years ago
- An Incident Response tool that visualizes historic process execution evidence (based on Event ID 4688 - Process Creation Event) in a tree…☆60Updated 8 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 4 years ago
- Script for parsing Symantec Endpoint Protection logs, VBNs, and ccSubSDK database.☆64Updated 3 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 4 years ago