NextronSystems / aurora-agent-manual
Aurora Agent User Manual
☆27Updated 2 months ago
Alternatives and similar repositories for aurora-agent-manual:
Users that are interested in aurora-agent-manual are comparing it to the libraries listed below
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆33Updated 5 months ago
- petit "playbook" qui pourrait servir de base à une réponse à incident lors d'une attaque de type ransomware☆21Updated 2 years ago
- Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)☆42Updated 2 years ago
- ☆21Updated last year
- DFIR ORC PARSER PROJECT☆25Updated 2 months ago
- Guide journalisation Microsoft☆60Updated 9 months ago
- The core backend server handling API requests and task management☆38Updated 2 weeks ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- Canary Detection☆168Updated last year
- A sample VHDX file with multiple verbose examples of forensic and anti-forensics artifacts. Meant to be basic and can be expanded upon. P…☆26Updated 2 years ago
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆26Updated last month
- THOR APT Scanner User Manual☆18Updated last week
- General Content☆26Updated 9 months ago
- Baseline a Windows System against LOLBAS☆26Updated last year
- LOKI2 - Simple IOC and YARA Scanner☆92Updated 8 months ago
- Outil de récupération automatique des données AZure / Automated tool for dumping Azure configuration data☆19Updated last week
- DEbian Cve REproducer Tool☆24Updated last year
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆36Updated 3 months ago
- Interactive simulation of a fictional ransomware group's dashboard☆12Updated 6 months ago
- Algorithme d'apprentissage statistique permettant de créer un modèle sur les lignes de commandes des évènements "Création de Processus", …☆83Updated last year
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆76Updated last year
- Configurations for DFIR ORC☆27Updated last year
- Threat Simulator for Enterprise Networks☆14Updated 2 years ago
- A simple tool designed to create Atomic Red Team tests with ease.☆39Updated last month
- Web Application for domain name monitoring / alerting☆63Updated 8 months ago
- Repository to handle issues with our free EDR agent Aurora Lite☆27Updated last year
- VirtualGHOST Detection Tool☆91Updated 11 months ago
- Graphical map of known Advanced Persistent Threats☆53Updated last month
- PowerShell PE Parser☆62Updated 9 months ago
- Create your own certification authority with server certificates in a full automated way☆29Updated 8 months ago