Inovasys-CS / EDI
☆16Updated 3 weeks ago
Alternatives and similar repositories for EDI
Users that are interested in EDI are comparing it to the libraries listed below
Sorting:
- ☆15Updated 6 months ago
- ☆66Updated 2 years ago
- ☆16Updated 2 months ago
- Some important DFIR Resources☆83Updated 2 years ago
- Harness the power of Splunk for your investigations☆105Updated this week
- Repository for sharing examples of our artifacts data and for use in new analyst recruitment.☆99Updated 3 weeks ago
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆32Updated 2 months ago
- SIEM Cheat Sheet☆73Updated last year
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆84Updated 3 months ago
- Collection of scripts and tools related to the eCTHPv2 exam by INE.☆14Updated 2 years ago
- Incident Response documents and tooling☆72Updated last year
- Some Threat Hunting queries useful for blue teamers☆126Updated 3 years ago
- CarbonBlack EDR detection rules and response actions☆71Updated 8 months ago
- A collection of open source threat detection rules created by Cyber Castle's team.☆14Updated 2 years ago
- Resources To Learn And Understand SIGMA Rules☆175Updated 2 years ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆156Updated last month
- Repository of public reference frameworks for the DFIR community.☆116Updated last year
- SPL cheatsheet for Splunk.☆22Updated 2 years ago
- These are open source rules that can be utilized with QRadar to detect various types of threats in the environment.☆55Updated 5 years ago
- Jupyter Notebooks for the Blue Team☆144Updated last month
- Repository resource for threat hunter☆158Updated 6 years ago
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆78Updated 3 years ago
- A specification and style guide for YARA rules☆48Updated last year
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆87Updated last year
- Detection Engineering with YARA☆87Updated last year
- ☆69Updated 2 months ago
- ☆48Updated last week
- ☆7Updated 6 months ago
- Parses USB connection artifacts from offline Registry hives