DFIRKuiper / HoarderLinks
☆21Updated 3 years ago
Alternatives and similar repositories for Hoarder
Users that are interested in Hoarder are comparing it to the libraries listed below
Sorting:
- Remote access and Antivirus Logging Database☆45Updated last year
- ☆22Updated 3 years ago
- A simple script to read the contents of a zip/tar/folder and extract metadata☆21Updated 4 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago
- ☆73Updated last year
- Forensic tool for acquisition, triage and analysis of remote block devices via iSCSI protocol.☆43Updated last year
- ☆68Updated 2 months ago
- ESXi Cyber Security Incident Response Script☆25Updated last year
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆36Updated 2 years ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆49Updated last month
- An exercise to practice deobfuscating PowerShell Scripts.☆26Updated 2 years ago
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆27Updated 3 years ago
- Quick ESXi Log Parser☆28Updated 3 months ago
- Get-MiniTimeline - Triage Collection and Timeline Generation w/ KAPE☆32Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆55Updated last year
- A repo hosting the Markua content for the EZ Tools manuals hosted on Leanpub☆87Updated 5 months ago
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆89Updated last year
- A collection of various SIEM rules relating to malware family groups.☆70Updated last year
- ☆65Updated 3 years ago
- ☆35Updated last year
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆51Updated last year
- Forensic Artifact Collection Tool Matrix☆92Updated last year
- Sigma detection rules for hunting with the threathunting-keywords project☆58Updated 11 months ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆86Updated last month
- Tools and scripts to deploy and manage OpenRelik instances☆16Updated 7 months ago
- This repository contains sample log data that were collected after running adversary simulations in Microsoft 365☆23Updated last year
- A project that aims to automate Volatility3 at scale with the use of cloud strength and the power of KQL inside ADX.☆16Updated 5 months ago
- Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations☆103Updated 5 months ago
- Cheat sheets for threat hunting, detection and other stuff.☆34Updated 3 years ago
- Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.☆60Updated 8 months ago