SekoiaLab / FastIR_Agent
FastIR Agent is a Windows service to execute FastIR Collector on demand
☆14Updated 7 years ago
Alternatives and similar repositories for FastIR_Agent:
Users that are interested in FastIR_Agent are comparing it to the libraries listed below
- The FastIR Server is a Web server to schedule FastIR Collector forensics collect thanks to the FastIR Agent☆12Updated 7 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Updated 7 years ago
- Crack your macros like the math pros.☆33Updated 8 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Updated 7 years ago
- ☆16Updated 10 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆23Updated last year
- Python-based cloud node for local use☆11Updated 7 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- Parses Java Cache IDX files☆39Updated 7 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Updated 8 years ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 5 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Updated 6 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Updated 7 years ago
- Detect malicious domain, Blablablablabla☆26Updated 8 years ago
- Cli interface to threatcrowd.org☆19Updated 7 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- Public rules and samples for various automations through LimaCharlie.io☆11Updated 3 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago
- An informational repo about hunting for adversaries in your IT environment.☆14Updated 7 years ago
- ☆24Updated 2 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Updated 8 years ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Updated 8 years ago
- ☆14Updated 6 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- Threat Intel and Incident Reponse☆10Updated 6 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- Mass Triage Tools☆20Updated last month
- Command-line Interface for Binar.ly☆37Updated 8 years ago
- Python script to automatically create sigma rules from The hive observables☆24Updated 6 years ago