NextronSystems / aurora-agent-liteLinks
Repository to handle issues with our free EDR agent Aurora Lite
☆28Updated 2 years ago
Alternatives and similar repositories for aurora-agent-lite
Users that are interested in aurora-agent-lite are comparing it to the libraries listed below
Sorting:
- God Mode Detection Rules☆135Updated last year
- Convert Sigma rules to SIEM queries, directly in your browser.☆108Updated last week
- The backend server handling API requests and task management☆55Updated this week
- Extracting IoC data from eMail☆140Updated last month
- Automation tool for Windows Deception Host Burn-In☆86Updated last year
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆128Updated 2 years ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Updated last year
- IOCs published by Black Lotus Labs☆125Updated 3 months ago
- Algorithme d'apprentissage statistique permettant de créer un modèle sur les lignes de commandes des évènements "Création de Processus", …☆83Updated last year
- Venture: Cross-Platform GUI tool for parsing and analyzing Windows event logs☆91Updated last year
- Fast IOC and YARA Scanner☆88Updated 5 years ago
- ☆101Updated last month
- Powershell module for VMWare vSphere forensics☆158Updated last year
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆277Updated last week
- Website for ail-typo-squatting library☆71Updated 4 months ago
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆195Updated this week
- Guide journalisation Microsoft☆69Updated 3 weeks ago
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (ext4, XFS) journals (not systemd-journald logs), gene…☆103Updated 3 weeks ago
- Finding ClickFix and FakeCAPTCHA like it's 1999☆121Updated this week
- This repository contains supplemental items including IOCs, and signatures discussed in Huntress blogposts, and other media.☆46Updated last month
- ☆101Updated 2 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Updated 2 years ago
- Maintained by the ANY.RUN team, this repository provides YARA rules to help detect and classify various malware families and other malici…☆26Updated 3 months ago
- QuickSand document and PDF malware analysis tool written in Python☆136Updated 3 months ago
- VelociraptorMCP is a Model Context Protocol bridge for exposing LLMs to MCP clients.☆68Updated 5 months ago
- Remote access and Antivirus Logging Database☆45Updated last year
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆180Updated 8 months ago
- Cybersecurity's lighter side: a collection of the most amusing misunderstandings and missteps from newcomers to offensive security tools.…☆58Updated 2 years ago
- 🐍 High-performance, multi-threaded YARA & IOC scanner☆249Updated this week
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago