M00NLIG7 / ChopChopGoLinks
Rapidly Search and Hunt through Linux Forensics Artifacts
☆193Updated last year
Alternatives and similar repositories for ChopChopGo
Users that are interested in ChopChopGo are comparing it to the libraries listed below
Sorting:
- Rules generated from our investigations.☆195Updated this week
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆252Updated last year
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆171Updated 3 weeks ago
- MISP Playbooks☆203Updated last week
- Automated YARA Rule Standardization and Quality Assurance Tool☆225Updated this week
- A repository to share publicly available Velociraptor detection content☆173Updated last week
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆316Updated last month
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆191Updated 11 months ago
- Harness the power of Splunk for your investigations☆108Updated last week
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆155Updated 4 months ago
- An opensource sigma conversion tool built using pysigma☆130Updated last week
- Advanced Bash script designed for conducting digital forensics on Linux systems☆142Updated last year
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆155Updated 2 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Updated 9 months ago
- Repository of attack and defensive information for Business Email Compromise investigations☆256Updated last month
- Incident Response collection and processing scripts with automated reporting scripts☆303Updated 11 months ago
- A python script developed to process Windows memory images based on triage type.☆262Updated last year
- A repository of my own Sigma detection rules.☆160Updated 9 months ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆203Updated 2 years ago
- Active C&C Detector☆154Updated last year
- Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.☆183Updated last week
- LOKI2 - Simple IOC and YARA Scanner☆93Updated 10 months ago
- LotL RMM☆208Updated this week
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆318Updated last month
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆185Updated 6 months ago
- Powershell module for VMWare vSphere forensics☆152Updated 7 months ago
- Initial triage of Windows Event logs☆99Updated last year
- Windows Malware Investigation Scripts & Docs☆83Updated 7 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆124Updated last year
- ☆160Updated last year