Collection of scripts for use with Carbon Black Cb Response API
☆14May 7, 2022Updated 3 years ago
Alternatives and similar repositories for Rhythm-CB-Scripts
Users that are interested in Rhythm-CB-Scripts are comparing it to the libraries listed below
Sorting:
- Lookup file hashes, domain names and IP addresses using various vendors to assist with triaging potential threats.☆29Feb 15, 2026Updated last week
- Command line interface to Carbon Black Response☆38May 12, 2020Updated 5 years ago
- YARA duplicate rule detection and removal. YARA rule index creation. YARA rule file merger.☆10Jan 19, 2026Updated last month
- ASN.1 parser used by PeNet do parse Authenticode signatures☆14Apr 11, 2025Updated 10 months ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆20May 25, 2022Updated 3 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- Useful Threat Hunting Stuff☆32Sep 1, 2020Updated 5 years ago
- A framework for interacting with HCL AppScan on Cloud and HCL AppScan Enterprise☆12Mar 3, 2023Updated 2 years ago
- A web interface for Hashcat/oclHashcat☆30Nov 15, 2016Updated 9 years ago
- Kubernetes Scanner☆40Feb 14, 2022Updated 4 years ago
- Collection of useful, up to date, Carbon Black Response Queries☆84Oct 23, 2020Updated 5 years ago
- CB API scripts for IR, administration, etc.☆32Jun 3, 2019Updated 6 years ago
- DNSDelivery provides delivery and in memory execution of shellcode or .Net assembly using DNS requests delivery channel.☆145Oct 6, 2019Updated 6 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Feb 21, 2016Updated 10 years ago
- Manticore Adversary Emulation Cli☆47Aug 4, 2020Updated 5 years ago
- ☆39Jun 28, 2019Updated 6 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- Quantum Insert Backdoor POC☆11May 21, 2017Updated 8 years ago
- Security Onion Splunk App☆10May 18, 2015Updated 10 years ago
- Scan for open S3 buckets and dump☆10Mar 8, 2018Updated 7 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Nov 10, 2020Updated 5 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- Rhaegal is a tool written in Python 3 used to scan Windows Event Logs for suspicious logs. Rhaegal uses custom rule format to detect sus…☆42Sep 21, 2023Updated 2 years ago
- Manticore Ransomware Emulation - Educational Purpose Only!☆10Aug 2, 2020Updated 5 years ago
- event shipper for Carbon Black Defense notifications☆10Feb 25, 2023Updated 3 years ago
- Tools to automate and/or expedite response.☆116Jul 5, 2024Updated last year
- Converting data from services like Censys and Shodan to a common data model☆52Updated this week
- Decompile .Net code in Powershell☆13Sep 21, 2015Updated 10 years ago
- This repository was created to aid in the deployment/maintenance of the Sysmon service on a large number of computers.☆83Mar 20, 2023Updated 2 years ago
- ☆15Nov 29, 2017Updated 8 years ago
- 802.11 Exploitation Tool for use with Kali 2. More tools available than WHAT or WHAT Pi☆16Apr 3, 2016Updated 9 years ago
- Ossec cookbook for Chef, with secure & automated key management☆21Jun 13, 2013Updated 12 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Apr 20, 2018Updated 7 years ago
- ☆11Apr 30, 2015Updated 10 years ago
- DC25 Party Badge☆11Aug 7, 2017Updated 8 years ago
- Open source HIDS tailored for Microsoft Windows and Active Directory☆29Feb 13, 2026Updated 2 weeks ago
- ☆11Jul 16, 2017Updated 8 years ago
- Introduction to Reverse Engineering Training☆11Apr 22, 2015Updated 10 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago