CrowdStrike / CASTLinks
CrowdStrike Archive Scan Tool
☆84Updated 3 years ago
Alternatives and similar repositories for CAST
Users that are interested in CAST are comparing it to the libraries listed below
Sorting:
- Collection of useful Canary tools☆91Updated 2 months ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- Tools and scripts by Arctic Wolf☆69Updated 2 months ago
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago
- A collection of intelligence about Log4Shell and its exploitation activity.☆184Updated 3 years ago
- Query user sessions for the entire domain (Interactive/RDP etc), allowing you to query a Username and see all their logged on sessions, w…☆94Updated 6 months ago
- ☆188Updated this week
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago
- Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228☆151Updated 3 years ago
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆154Updated 3 years ago
- A GUI to query the API of abuse.ch.☆70Updated 3 years ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 6 months ago
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆65Updated 3 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆74Updated 3 weeks ago
- Fast IOC and YARA Scanner☆83Updated 5 years ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆49Updated last month
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆135Updated last year
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- Collection of PowerShell functinos and scripts a Blue Teamer might use☆84Updated 2 years ago
- Hunting Queries for Microsoft Defender Security Center https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defe…☆39Updated 4 years ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆71Updated 9 months ago
- ESXi Cyber Security Incident Response Script☆25Updated last year
- ☆42Updated 2 years ago
- Fast offline auditing of Active Directory passwords using Python.☆165Updated last year
- Blue Team detection lab created with Terraform and Ansible in Azure.☆163Updated 10 months ago
- ☆73Updated 11 months ago
- My conference presentations☆83Updated last week
- MDE relies on some of the Audit settings to be enabled☆99Updated 3 years ago
- GUI tool which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc. and exports results to a Microsoft …☆106Updated last month
- Conference presentations☆59Updated last month