Some IR notes
☆17Jul 2, 2016Updated 9 years ago
Alternatives and similar repositories for IRNotes
Users that are interested in IRNotes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows Event Forwarding for Active Directory Security Logs☆29Jun 28, 2016Updated 9 years ago
- PowerShell module with improved Active Directory cmdlets☆30Jan 24, 2017Updated 9 years ago
- Script for auditing whitelist and finding fronted domains and loosely typed regular expressions.☆13Dec 25, 2017Updated 8 years ago
- Maps process creation logged by Sysmon uses Google Org Chart API☆23Mar 5, 2016Updated 10 years ago
- Windows Registry Tweaks & Hacks☆53Aug 20, 2017Updated 8 years ago
- A collection of shellcode hashes☆17Aug 15, 2018Updated 7 years ago
- CVE-2021-22005批量验证python脚本☆13Sep 25, 2021Updated 4 years ago
- Analysis PE file or Shellcode☆50Jul 28, 2016Updated 9 years ago
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19May 11, 2021Updated 4 years ago
- A collection of offensive tools I've hacked together for CTFs and such☆20Aug 9, 2016Updated 9 years ago
- Windows Syslog Command Line Client☆15Nov 21, 2012Updated 13 years ago
- ☆20Jan 10, 2025Updated last year
- A collection of infrastructure related tests for use with Pester & PowerShell.☆15Jul 12, 2019Updated 6 years ago
- Windows Drivers☆100Apr 6, 2019Updated 6 years ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- ☆20Jun 25, 2019Updated 6 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Oct 31, 2018Updated 7 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- Proof-of-concept malware programs. For educational purpose only.☆23Sep 19, 2016Updated 9 years ago
- Scripts to aid analysis of files obfuscated with ScatterBee.☆24Jan 6, 2023Updated 3 years ago
- Various scripts to help you out. Mostly very scrappy, but functional. I realise Write-Host is not the way to do things, but I wrote som…☆27May 13, 2022Updated 3 years ago
- Registry entries to customize Windows☆29Aug 13, 2018Updated 7 years ago
- Group Policy Hijacking☆32Apr 6, 2018Updated 7 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- API to access the Redis database of a BGP Ranking instance.☆17Dec 11, 2017Updated 8 years ago
- A Microsoft Windows service to provide telemetry on Windows executable memory page changes to facilitate threat detection☆32Oct 7, 2020Updated 5 years ago
- Extracts indicators of compromise (IOCs), including domain names, IPv4 addresses, email addresses, and hashes, from text.☆11Dec 10, 2017Updated 8 years ago
- Framework complet d'analyse de malware☆12Feb 22, 2016Updated 10 years ago
- Powershell tool to download malware samples.☆12Feb 10, 2016Updated 10 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆38May 3, 2019Updated 6 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- Automation for VirusTotal☆31May 6, 2016Updated 9 years ago
- Copy of the libewf source code that is configured for a 64-bit MS Visual Studio build.☆17Aug 17, 2020Updated 5 years ago
- Repository for team's work on the Microsoft Malware Classification Challenge Kaggle competition.☆11Mar 17, 2015Updated 11 years ago
- Automatically block IPs with failed SSH logins using pf(4)☆16Aug 21, 2015Updated 10 years ago
- Dump and parse embedded certificates from Windows binaries☆11Jan 3, 2012Updated 14 years ago