Beercow / SEPparserLinks
Script for parsing Symantec Endpoint Protection logs, VBNs, and ccSubSDK database.
☆65Updated 2 years ago
Alternatives and similar repositories for SEPparser
Users that are interested in SEPparser are comparing it to the libraries listed below
Sorting:
- Stand-alone parser for User Access Logging from Server 2012 and newer systems☆77Updated last year
- ☆88Updated 2 months ago
- Extract BITS jobs from QMGR queue and store them as CSV records☆75Updated 8 months ago
- Random hunting ordiented yara rules☆97Updated 2 years ago
- ☆35Updated last year
- YARA rule analyzer to improve rule quality and performance☆104Updated 6 months ago
- A repo for centralizing ongoing research on the new Windows 10/11 DFIR artifact, EventTranscript.db.☆41Updated 3 years ago
- A parser of Windows Defender's DetectionHistory forensic artifact, containing substantial info about quarantined files and executables.☆113Updated 3 years ago
- ☆21Updated 3 years ago
- Get-MiniTimeline - Triage Collection and Timeline Generation w/ KAPE☆33Updated last year
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆81Updated 2 weeks ago
- Publicly shareable windows event log message data☆27Updated 5 years ago
- Blueteam operational triage registry hunting/forensic tool.☆150Updated last month
- A library for fast parse & import of Windows Eventlogs into Elasticsearch.☆84Updated 4 months ago
- ☆19Updated 9 months ago
- Script to automate Linux live evidence collection☆27Updated 3 years ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Updated 2 years ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Updated last year
- Memory Baseliner is a script that can compare two windows memory images or perform frequency of occurrence / data stacking analysis on mu…☆55Updated 2 years ago
- Collection of useful, up to date, Carbon Black Response Queries☆84Updated 5 years ago
- JPCERT/CC public YARA rules repository☆110Updated 10 months ago
- ☆38Updated 4 years ago
- Automated detection rule analysis utility☆29Updated 3 years ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆115Updated last year
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆45Updated 3 years ago
- Carve file metadata from NTFS index ($I30) attributes☆71Updated last year
- A repository that maps API calls to Sysmon Event ID's.☆122Updated 2 years ago
- Parses the WMI object database....looking for persistence☆34Updated 5 years ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated 2 years ago
- Simple yara rule manager☆66Updated 2 years ago