M00NLIG7 / ChopChopGoLinks
Rapidly Search and Hunt through Linux Forensics Artifacts
☆201Updated last year
Alternatives and similar repositories for ChopChopGo
Users that are interested in ChopChopGo are comparing it to the libraries listed below
Sorting:
- Rules generated from our investigations.☆203Updated 6 months ago
- Incident Response collection and processing scripts with automated reporting scripts☆318Updated last year
- Automated YARA Rule Standardization and Quality Assurance Tool☆264Updated this week
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆322Updated 7 months ago
- A repository to share publicly available Velociraptor detection content☆191Updated last week
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆180Updated 7 months ago
- LOKI2 - Simple IOC and YARA Scanner☆109Updated 5 months ago
- Harness the power of Splunk for your investigations☆145Updated 2 months ago
- An opensource sigma conversion tool built using pysigma☆153Updated last week
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆167Updated 3 weeks ago
- Sigma rules to share with the community☆123Updated 11 months ago
- Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.☆211Updated last week
- A python script developed to process Windows memory images based on triage type.☆265Updated 2 years ago
- LotL RMM☆269Updated 3 weeks ago
- The Github project for The Defender's Guide by Luke Paine and Jonathan Johnson☆159Updated 2 years ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆252Updated 2 months ago
- A repository of my own Sigma detection rules.☆162Updated last month
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (ext4, XFS) journals (not systemd-journald logs), gene…☆98Updated last week
- Forensic Artifact Collection Tool Matrix☆91Updated last year
- yara detection rules for hunting with the threathunting-keywords project☆156Updated 7 months ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆342Updated 3 weeks ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆173Updated last year
- MISP Playbooks☆222Updated 2 months ago
- ☆77Updated 3 months ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆208Updated 3 years ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆150Updated last year
- ☆149Updated 2 months ago
- Powershell module for VMWare vSphere forensics☆157Updated last year
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆141Updated last year
- Repository of attack and defensive information for Business Email Compromise investigations☆271Updated 7 months ago