CrowdStrike / CASTLinks
CrowdStrike Archive Scan Tool
☆85Updated 3 years ago
Alternatives and similar repositories for CAST
Users that are interested in CAST are comparing it to the libraries listed below
Sorting:
- Tools and scripts by Arctic Wolf☆69Updated 3 months ago
- Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228☆151Updated 3 years ago
- Collection of useful Canary tools☆92Updated 2 weeks ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆65Updated 3 years ago
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆156Updated 3 years ago
- A collection of intelligence about Log4Shell and its exploitation activity.☆184Updated 3 years ago
- Query user sessions for the entire domain (Interactive/RDP etc), allowing you to query a Username and see all their logged on sessions, w…☆94Updated 7 months ago
- Unleash the power of the Falcon Platform at the CLI☆129Updated 3 weeks ago
- ☆73Updated last year
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 6 months ago
- Collection of PowerShell functinos and scripts a Blue Teamer might use☆87Updated 2 years ago
- ☆67Updated 4 years ago
- ☆42Updated 2 years ago
- Collection of Dashboards for Threat Hunting and more!☆70Updated 5 years ago
- Hunting Queries for Microsoft Defender Security Center https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defe…☆39Updated 4 years ago
- Fast IOC and YARA Scanner☆84Updated 5 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆76Updated 2 weeks ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆65Updated 3 years ago
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆67Updated last year
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- Hashes for vulnerable LOG4J versions☆155Updated 3 years ago
- ESXi Cyber Security Incident Response Script☆25Updated last year
- Memory Forensic System on Cloud☆91Updated last year
- BulkStrike enables the usage of CrowdStrike Real Time Response (RTR) to bulk execute commands on multiple machines.☆42Updated 2 years ago
- MDE relies on some of the Audit settings to be enabled☆100Updated 3 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆103Updated last year
- A GUI to query the API of abuse.ch.☆70Updated 3 years ago
- OSSEM Data Dictionaries☆63Updated 9 months ago