AbGuthrie / goqueryLinks
Provide a shell like interface by utilizing osquery's distributed API
☆81Updated 5 years ago
Alternatives and similar repositories for goquery
Users that are interested in goquery are comparing it to the libraries listed below
Sorting:
- Competition Infrastructure Management☆87Updated 3 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Updated 7 years ago
- Things to know when DFIR occurs near a vault deployment.☆43Updated 7 years ago
- Extract indicators of compromise from text, including "escaped" ones.☆160Updated 5 years ago
- A packer utility to create and capture DFIR Image for use AWS & Azure☆15Updated 5 years ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Updated 6 years ago
- AWS EKS Cluster Forensics☆23Updated 3 years ago
- A CLI tool for querying passive DNS services☆41Updated last year
- Serverless honeytoken 🕵🏻♂️☆79Updated 2 years ago
- Testing/collecting some container breakouts☆94Updated 5 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- How to Zeek Sysmon Logs!☆102Updated 3 years ago
- Collect autorun records from running system☆60Updated 3 years ago
- Recog-Go: Pattern Recognition using Rapid7 Recog☆111Updated last year
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆109Updated 7 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP API☆30Updated 4 years ago
- Automatically create YARA rules from malicious documents.☆211Updated 3 years ago
- References for FIRST CTI 2019 Symposium presentation☆22Updated 6 years ago
- Use Markov Chains to obfuscate data as other data☆54Updated 8 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆48Updated 2 years ago
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆43Updated 2 years ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- egrets monitors egress☆46Updated 5 years ago
- Pentester-focused Docker registry tool to enumerate and pull images☆111Updated 5 years ago
- A simple Docker container that serves the MITRE ATT&CK Navigator web app☆27Updated 2 years ago
- Recon Hunt Queries☆77Updated 4 years ago
- Cisco Orbital - Osquery queries by Talos☆134Updated 10 months ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 6 years ago