Cisco-Talos / badgerboard
☆16Updated last year
Alternatives and similar repositories for badgerboard:
Users that are interested in badgerboard are comparing it to the libraries listed below
- Zeek Profinet I/O Context Manager Parser - CISA ICSNPP☆10Updated 5 months ago
- Parser for Windows PowerShell script block logs☆13Updated 3 months ago
- Presentation Slides and Resources☆16Updated 9 months ago
- ICS/OT related Wireshark profiles + adding some other (IT or OT related) Open Source Wireshark Profiles☆17Updated last week
- Automatic detection engineering technical state compliance☆55Updated 8 months ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆24Updated 8 years ago
- ☆11Updated 4 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- VTC - Velociraptor Timeline Creator☆17Updated 10 months ago
- PowerShell script for hardening GE digital CIMPLICITY servers☆23Updated 3 years ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆31Updated 2 months ago
- A simple way to exfiltrate data using spotify API☆18Updated 3 weeks ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆22Updated last year
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- Modular malware analysis artifact collection and correlation framework☆53Updated 11 months ago
- Resource links (video, slides & code) for my conference talks | presentations | workshops☆13Updated 2 months ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆51Updated last year
- This repository has been archived in favor of https://github.com/idaholab/Malcolm-Test-Artifacts☆33Updated 3 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 3 months ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated last year
- An experimental Velociraptor implementation using cloud infrastructure☆24Updated last week
- Scripts and lists to help generate YARA friendly string mutations☆21Updated last year
- Linux #rootkit and #malware revealer☆24Updated 8 months ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- A co-simulation framework for reasearching cybersecurity in power grids.☆21Updated 3 months ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆23Updated 2 years ago
- ☆22Updated 2 years ago
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆59Updated last week
- create a "simulated internet" cyber range environment☆16Updated last week
- A simple tool designed to create Atomic Red Team tests with ease.☆39Updated 3 weeks ago