Project-Prismatica / Oculus
☆11Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Oculus
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Updated 5 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- ☆21Updated last year
- ☆11Updated 3 years ago
- Hashes of infamous malware☆25Updated last year
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆22Updated 3 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 4 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆31Updated last year
- ☆13Updated 4 years ago
- Snapshot, patch, health-check, and potentially roll-back Windows VMs☆34Updated 6 years ago
- A sample VHDX file with multiple verbose examples of forensic and anti-forensics artifacts. Meant to be basic and can be expanded upon. P…☆25Updated last year
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 2 years ago
- An analytical framework for network traffic and behavioral analytics☆22Updated last year
- A few quick recipes for those that do not have much time during the day☆21Updated 2 weeks ago
- A MITRE ATT&CK Lookup Tool☆43Updated 6 months ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆31Updated 2 weeks ago
- Resource links (video, slides & code) for my conference talks | presentations | workshops☆11Updated last month
- Various components we use in labs☆10Updated 4 years ago
- PowerShell Memory Pulling script☆19Updated 9 years ago
- ☆29Updated 5 years ago
- Scapy packet fragment reassembly engines☆34Updated 3 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆25Updated 8 years ago
- Threat Hunter's Knowledge Base☆21Updated 2 years ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 3 years ago
- ☆41Updated 7 months ago
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆24Updated 4 years ago
- Tool used to perform threat intelligence against packet data☆35Updated 6 months ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆16Updated 3 years ago
- The "DFUR" Splunk application and data that was presented at the 2020 SANS DFIR Summit.☆12Updated 4 years ago
- Defence Against the Dark Arts☆34Updated 5 years ago