CrowdStrike / automactcLinks
AutoMacTC: Automated Mac Forensic Triage Collector
☆541Updated 3 years ago
Alternatives and similar repositories for automactc
Users that are interested in automactc are comparing it to the libraries listed below
Sorting:
- A framework for orchestrating forensic collection, processing and data export☆324Updated last week
- Collection of forensics artifacts location for Mac OS X and iOS☆332Updated 3 years ago
- A repo containing tools developed by Carbon Black's Threat Research Team: Threat Analysis Unit☆235Updated 3 years ago
- CyLR - Live Response Collection Tool☆682Updated 3 years ago
- The Cold Disk Quick Response (CDQR) tool is a fast and easy to use forensic artifact parsing tool that works on disk images, mounted driv…☆338Updated 2 years ago
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆499Updated 2 years ago
- DFIRTrack - The Incident Response Tracking Application☆520Updated 9 months ago
- Scripts and code referenced in CrowdStrike blog posts☆331Updated 5 years ago
- Actionable analytics designed to combat threats☆989Updated 3 years ago
- osquery extensions by Trail of Bits☆265Updated 2 years ago
- Tool Analysis Result Sheet☆354Updated 7 years ago
- CLI tool to manage a SIFT Install☆420Updated 2 years ago
- ATT&CK Remote Threat Hunting Incident Response☆200Updated 6 months ago
- Online hash checker for Virustotal and other services☆829Updated 3 months ago
- 🧭 The artifactcollector is a customizable agent to collect forensic artifacts on any Windows, macOS or Linux system☆288Updated last month
- ☆173Updated 11 months ago
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,158Updated last year
- A repository for using osquery for incident detection and response☆853Updated 2 years ago
- A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework☆352Updated 4 years ago
- A collection of red team and adversary emulation resources developed and released by MITRE.☆512Updated 4 years ago
- A knowledge base of actionable Incident Response techniques☆641Updated 3 years ago
- Mapping the MITRE ATT&CK Matrix with Osquery☆796Updated 2 years ago
- Digital Forensics artifact repository☆1,129Updated 5 months ago
- Python Script to access ATT&CK content available in STIX via a public TAXII server☆564Updated 6 months ago
- Splunk code (SPL) for serious threat hunters and detection engineers.☆284Updated last year
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆218Updated 2 months ago
- Investigate suspicious activity by visualizing Sysmon's event log☆423Updated last year
- User guide of MISP☆270Updated 5 months ago
- Aftermath is a free macOS IR framework☆524Updated 6 months ago
- Tools, techniques, cheat sheets, and other resources to assist those defending organizations and detecting adversaries☆452Updated 3 years ago