NextronSystems / velociraptor-artifacts-thor
Thor Artifacts for Velociraptor
☆15Updated 9 months ago
Alternatives and similar repositories for velociraptor-artifacts-thor:
Users that are interested in velociraptor-artifacts-thor are comparing it to the libraries listed below
- An experimental Velociraptor implementation using cloud infrastructure☆24Updated this week
- Scripts to for ready-to-use Velociraptor instance deployment in Azure☆13Updated last year
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- ☆41Updated 11 months ago
- Quick ESXi Log Parser☆17Updated 2 months ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- CLI generator for Velociraptor offline collector☆9Updated 6 months ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated last year
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- ☆10Updated 7 months ago
- This repository provides a comprehensive collection of detection rules and threat intelligence focused on malicious Chrome extensions sup…☆8Updated 2 months ago
- ESXi Cyber Security Incident Response Script☆23Updated 6 months ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆51Updated last year
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆32Updated 4 months ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Updated 2 years ago
- Living off the False Positive!☆35Updated 2 months ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆31Updated 2 months ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Updated 4 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Updated 2 years ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆10Updated 2 years ago
- ☆21Updated 2 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- ☆19Updated 2 months ago
- Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files☆31Updated 2 years ago
- my MSTICpy practice and custom tools repository☆11Updated 4 months ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆30Updated 2 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- ☆14Updated 2 years ago