OTRF / 2021-OceanLotus-workshopLinks
☆18Updated 4 years ago
Alternatives and similar repositories for 2021-OceanLotus-workshop
Users that are interested in 2021-OceanLotus-workshop are comparing it to the libraries listed below
Sorting:
- Post-Infection Collection Toolkit☆95Updated 2 years ago
- Swift Command line tool used for proactive detection of malicious activity on macOS systems.☆68Updated 5 years ago
- Simple Docker-based quickstart for osquery, Fleet, and ELK stack☆63Updated 2 years ago
- Run Sigma detection rules on logs from the new MacOS EndpointSecurity Framework☆20Updated 4 years ago
- A triage data collection script for macOS☆28Updated 4 years ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆35Updated 2 years ago
- Powershell Scripts to work on Crowdstrike Falcon that pull back raw data relevant to forensic investigation☆23Updated 10 months ago
- Payload designed for targeting Jamf enrolled devices.☆38Updated 2 years ago
- ☆28Updated last year
- A ruleset to find potentially malicious code in macOS malware samples☆40Updated 2 years ago
- Parser fo macOS/iOS FSEvents Logs☆38Updated last year
- A minimal malware analysis sandbox for macOS☆32Updated 2 years ago
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆28Updated 4 months ago
- SANS #CTI Summit 2025☆13Updated 9 months ago
- ☆34Updated 2 years ago
- Scripts from my book OS X Incident Response Scripting and Analysis -> https://www.amazon.com/dp/012804456X/ref=cm_sw_r_tw_dp_U_x_fQeLAb68…☆50Updated 9 years ago
- ☆77Updated 3 weeks ago
- Notes from my "Implementing a Kick-Butt Training Program: Blue Team GO!" talk☆12Updated 6 years ago
- AWS EKS Cluster Forensics☆23Updated 4 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 3 years ago
- Public release of Whalehoney Honeypot☆29Updated 3 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 3 years ago
- https://wojciechregula.blog/post/macos-red-teaming-get-ad-credentials-from-nomad/☆42Updated 3 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 4 years ago
- Track progress and keep notes while working through likethecoins' CTI Self Study Plan☆29Updated 3 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆65Updated 3 years ago
- Collection of Slides From My Conference Talks☆20Updated 2 years ago
- Unleash the power of the Falcon Platform at the CLI☆131Updated 3 weeks ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Updated 8 months ago
- Using Microsoft 365 App Passwords for persistence☆23Updated 5 years ago