Inovasys-CS / EDILinks
☆16Updated last month
Alternatives and similar repositories for EDI
Users that are interested in EDI are comparing it to the libraries listed below
Sorting:
- ☆15Updated 6 months ago
- ☆66Updated 2 years ago
- Some important DFIR Resources☆83Updated 2 years ago
- ☆16Updated 3 months ago
- Windows Malware Investigation Scripts & Docs☆83Updated 6 months ago
- Harness the power of Splunk for your investigations☆107Updated this week
- Some Threat Hunting queries useful for blue teamers☆127Updated 3 years ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆155Updated 2 months ago
- A collection of open source threat detection rules created by Cyber Castle's team.☆14Updated 3 years ago
- SIEM Cheat Sheet☆73Updated last year
- Repository resource for threat hunter☆158Updated 6 years ago
- Incident Response documents and tooling☆74Updated last year
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆32Updated 3 months ago
- Jupyter Notebooks for the Blue Team☆144Updated 2 months ago
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆38Updated 3 years ago
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆78Updated 3 years ago
- Repository for sharing examples of our artifacts data and for use in new analyst recruitment.☆99Updated last month
- Collection of scripts and tools related to the eCTHPv2 exam by INE.☆14Updated 2 years ago
- ☆48Updated 2 weeks ago
- Sample evtx files to use for testing hayabusa detection rules☆57Updated 7 months ago
- A repository of my own Sigma detection rules.☆160Updated 8 months ago
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆85Updated 3 months ago
- Random notes collected on the intertubes relating to DFIR☆34Updated last year
- A specification and style guide for YARA rules☆48Updated last year
- This repository contains Splunk queries to hunt some anomalies☆42Updated 2 years ago
- Repository of attack and defensive information for Business Email Compromise investigations☆252Updated 3 weeks ago
- ☆133Updated last year
- SPL cheatsheet for Splunk.☆23Updated 2 years ago
- Config files for my GitHub profile.☆14Updated 2 years ago
- ☆104Updated last week