PwCUK-CTO / SANSCTISummit2021-xStart
Indicators of compromise, YARA rules, and Python scripts to supplement the SANS CTI Summit 2021 talk: "xStart when you're ready".
☆14Updated 3 years ago
Alternatives and similar repositories for SANSCTISummit2021-xStart:
Users that are interested in SANSCTISummit2021-xStart are comparing it to the libraries listed below
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆44Updated 3 years ago
- ☆34Updated 6 months ago
- Logbook for Digital Forensics and Incident Response☆50Updated 9 months ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆114Updated last year
- Incident Response Network Tools☆24Updated 3 years ago
- Collection of useful, up to date, Carbon Black Response Queries☆83Updated 4 years ago
- CSIRT Jump Bag☆26Updated last year
- Resources for SANS CTI Summit 2021 presentation☆102Updated last year
- My Jupyter Notebooks☆36Updated last month
- ☆87Updated last year
- Open source training materials for law-enforcement and organisations interested in DFIR.☆55Updated 3 months ago
- Simple yara rule manager☆66Updated 2 years ago
- ☆39Updated 5 years ago
- Extract BITS jobs from QMGR queue and store them as CSV records☆75Updated 2 months ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆63Updated 2 years ago
- Hunt malware with Volatility☆47Updated 11 months ago
- Python library for threat intelligence☆86Updated 3 months ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- Publicly shareable windows event log message data☆27Updated 5 years ago
- A repo for centralizing ongoing research on the new Windows 10/11 DFIR artifact, EventTranscript.db.☆39Updated 2 years ago
- ☆29Updated 4 years ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆53Updated 2 years ago
- The project was moved here https://github.com/atomic-threat-coverage/atomic-threat-coverage☆24Updated 5 years ago
- ☆34Updated 4 years ago
- Three datasets to practice Threat Hunting against.☆43Updated last year
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- Stand-alone parser for User Access Logging from Server 2012 and newer systems☆73Updated last year
- A completely unsupported set of scripts used in SANS FOR572, Advanced Network Forensics and Analysis☆26Updated 4 months ago