PolarBearGod / CrowdStrike-RTR-ScriptsLinks
☆26Updated 3 years ago
Alternatives and similar repositories for CrowdStrike-RTR-Scripts
Users that are interested in CrowdStrike-RTR-Scripts are comparing it to the libraries listed below
Sorting:
- BulkStrike enables the usage of CrowdStrike Real Time Response (RTR) to bulk execute commands on multiple machines.☆42Updated 2 years ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆115Updated last year
- A PowerShell incident response script for quick triage☆80Updated 3 years ago
- ☆63Updated 2 years ago
- A collection of Splunk's Search Processing Language (SPL) for Threat Hunting with CrowdStrike Falcon☆208Updated 5 years ago
- Real-time Response scripts and schema☆115Updated last year
- ☆76Updated last year
- Notes on responding to security breaches relating to Azure AD☆114Updated 3 years ago
- ☆73Updated 9 months ago
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆37Updated 3 years ago
- A script that updates KAPE (using Get-KAPEUpdate.ps1) as well as EZ Tools (within .\KAPE\Modules\bin) and the ancillary files that enhanc…☆57Updated last month
- Jupyter notebooks for threat hunting☆58Updated 4 months ago
- Tool to extract Sessions, MessageID(s) and find the emails belonging to MessageID(s). This script utilizes the MailItemsAccessed features…☆41Updated 4 years ago
- Conference presentations☆47Updated last year
- Random notes collected on the intertubes relating to DFIR☆34Updated 2 years ago
- ☆8Updated 9 months ago
- ☆35Updated 9 months ago
- ☆45Updated 2 years ago
- ☆33Updated 3 years ago
- Scripts to facilitate filtering with Plaso☆126Updated 5 years ago
- 2021 SANS DFIR Summit: Greppin' Logs☆20Updated 4 years ago
- The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Of…☆260Updated 4 years ago
- Collection of useful, up to date, Carbon Black Response Queries☆84Updated 4 years ago
- ☆86Updated 5 months ago
- Cybersecurity Incident Response Plan☆91Updated 4 years ago
- Convert Sigma rules to LogRhythm searches☆21Updated 3 years ago
- This code snippet retrieves Azure Sentinel rules that are mapped to MITRE ATT&CK Framework and generates the related MITRE D3FEND defense…☆73Updated 4 years ago
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆223Updated 4 months ago
- ☆34Updated 2 years ago
- Collection of PowerShell functinos and scripts a Blue Teamer might use☆84Updated last year