OTRF / 2021-OceanLotus-workshopLinks
☆18Updated 4 years ago
Alternatives and similar repositories for 2021-OceanLotus-workshop
Users that are interested in 2021-OceanLotus-workshop are comparing it to the libraries listed below
Sorting:
- Post-Infection Collection Toolkit☆95Updated 2 years ago
- Swift Command line tool used for proactive detection of malicious activity on macOS systems.☆68Updated 5 years ago
- A triage data collection script for macOS☆28Updated 4 years ago
- A minimal malware analysis sandbox for macOS☆34Updated 2 years ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆35Updated 2 years ago
- Payload designed for targeting Jamf enrolled devices.☆39Updated 2 years ago
- A ruleset to find potentially malicious code in macOS malware samples☆41Updated 2 years ago
- ☆28Updated last year
- Parser fo macOS/iOS FSEvents Logs☆38Updated last year
- ☆34Updated 2 years ago
- Run Sigma detection rules on logs from the new MacOS EndpointSecurity Framework☆20Updated 4 years ago
- Simple Docker-based quickstart for osquery, Fleet, and ELK stack☆63Updated 2 years ago
- Powershell Scripts to work on Crowdstrike Falcon that pull back raw data relevant to forensic investigation☆23Updated 11 months ago
- macOS .DS_Store Parser☆72Updated 4 years ago
- https://wojciechregula.blog/post/macos-red-teaming-get-ad-credentials-from-nomad/☆42Updated 3 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 4 years ago
- AWS EKS Cluster Forensics☆23Updated 4 years ago
- Passive OS detection based on SYN packets without Transmitting any Data☆49Updated 2 years ago
- ☆78Updated 2 weeks ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 4 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 3 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆65Updated 3 years ago
- ☆39Updated 4 years ago
- A canary designed to minimize the impact from certain Ransomware actors☆100Updated 4 years ago
- Scripts from my book OS X Incident Response Scripting and Analysis -> https://www.amazon.com/dp/012804456X/ref=cm_sw_r_tw_dp_U_x_fQeLAb68…☆50Updated 9 years ago
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆30Updated 5 months ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Updated last month
- Public release of Whalehoney Honeypot☆29Updated 3 years ago
- Automatic detection engineering technical state compliance☆55Updated last year
- Uses Apple's MDM protocol to backdoor a device with a malicious profile.☆55Updated 4 years ago