Neo23x0 / IRNotesLinks
Some IR notes
☆17Updated 9 years ago
Alternatives and similar repositories for IRNotes
Users that are interested in IRNotes are comparing it to the libraries listed below
Sorting:
- PowerShell No Agent Hunting☆111Updated 7 years ago
- Lists of sources and utilities utilized to hunt, detect and prevent evildoers.☆168Updated 7 years ago
- Parser for Windows PowerShell script block logs☆100Updated last year
- Invoke-LiveResponse☆150Updated 3 years ago
- Reconstruct process trees from event logs☆147Updated 5 years ago
- PowerGRR is an API client library in PowerShell working on Windows, Linux and macOS for GRR automation and scripting.☆58Updated 3 years ago
- Dump of organized knowledge on DFIR☆138Updated 4 years ago
- InvestigationPlaybookSpec☆71Updated 8 years ago
- Python script to decode common encoded PowerShell scripts☆217Updated 7 years ago
- Parse Windows Prefetch files: Supports XP - Windows 10 Prefetch files☆122Updated last year
- Extract common Windows artifacts from source images and VSCs☆64Updated 4 years ago
- Command line interface to Carbon Black Response☆38Updated 5 years ago
- Slides and Other Resources from my latest Talks and Presentations☆24Updated 4 months ago
- Theat hunting notes in flat file format and mapped to MITRE's ATT&CK IDs☆43Updated 7 years ago
- PE Import Hash Generator☆79Updated 8 years ago
- Python IOC Editor☆65Updated 10 years ago
- Sysmon configuration☆65Updated 7 years ago
- Page File analysis tools.☆131Updated 10 years ago
- SEC599 supporting GitHub repository☆16Updated 6 years ago
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Updated 8 years ago
- Python script for extracting USB information from Windows registry hives☆128Updated 6 years ago
- A Splunk app with saved reports derived from Sigma rules☆73Updated 7 years ago
- ☆39Updated 6 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 7 years ago
- Repository of yara rules☆60Updated 3 years ago
- Log newly created WMI consumers and processes to the Windows Application event log☆124Updated 7 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 8 years ago
- Lazy Office Analyzer☆121Updated 8 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆107Updated 5 years ago
- Expert Investigation Guides☆51Updated 4 years ago