CrowdStrike / CAST
CrowdStrike Archive Scan Tool
☆83Updated 3 years ago
Alternatives and similar repositories for CAST:
Users that are interested in CAST are comparing it to the libraries listed below
- Audit program for AzureAD☆147Updated last year
- Tools and scripts by Arctic Wolf☆67Updated 11 months ago
- Query user sessions for the entire domain (Interactive/RDP etc), allowing you to query a Username and see all their logged on sessions, w…☆91Updated 2 weeks ago
- MDE relies on some of the Audit settings to be enabled☆97Updated 2 years ago
- CrowdStrike's Open Source Policy & Contribution Guide☆39Updated last week
- Tool to extract Sessions, MessageID(s) and find the emails belonging to MessageID(s). This script utilizes the MailItemsAccessed features…☆39Updated 4 years ago
- The Office 365 Extractor is a tool that allows for complete and reliable extraction of the Unified Audit Log (UAL)☆262Updated 3 years ago
- My conference presentations☆66Updated last year
- A GUI to query the API of abuse.ch.☆70Updated 2 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 3 years ago
- Unleash the power of the Falcon Platform at the CLI☆116Updated last week
- Converts text dumps from CIS Benchmark PDFs to CSV & Excel formats.☆59Updated 8 months ago
- ☆83Updated last month
- ☆72Updated 5 months ago
- Pushes Sysmon Configs☆88Updated 3 years ago
- Hunting Queries for Microsoft Defender Security Center https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defe…☆39Updated 4 years ago
- Search a filesystem for indicators of compromise (IoC).☆71Updated last month
- ☆41Updated last year
- Collection of useful Canary tools☆77Updated 2 weeks ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- Collection of PowerShell functinos and scripts a Blue Teamer might use☆83Updated last year
- Conference presentations☆47Updated last year
- Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228☆149Updated 3 years ago
- Memory Forensic System on Cloud☆89Updated last year
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆151Updated 3 years ago
- Full of public notes and Utilities☆98Updated last month
- ☆60Updated 3 years ago
- This repo is where I store my Threat Hunting ideas/content☆87Updated last year
- ☆111Updated 5 years ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆114Updated last year