Tatsuya-hasegawa / MSTICPy_utilsLinks
my MSTICpy practice and custom tools repository
☆11Updated 5 months ago
Alternatives and similar repositories for MSTICPy_utils
Users that are interested in MSTICPy_utils are comparing it to the libraries listed below
Sorting:
- Library of threat hunts to get any user started!☆45Updated 5 years ago
- ☆22Updated 2 years ago
- Quick ESXi Log Parser☆26Updated 3 weeks ago
- Get-MiniTimeline - Triage Collection and Timeline Generation w/ KAPE☆33Updated last year
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆34Updated 3 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Updated 7 months ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated 2 years ago
- ☆21Updated 3 years ago
- ☆21Updated 6 months ago
- ESXi Cyber Security Incident Response Script☆25Updated last year
- Script to automate Linux live evidence collection☆27Updated 3 years ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- Sigma detection rules for hunting with the threathunting-keywords project☆56Updated 7 months ago
- Contains compiled binaries of Volatility☆35Updated 4 months ago
- This directory contains presentations and related materials of my speaking engagements. I also use this to record historical presentation…☆17Updated 7 months ago
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆21Updated last year
- Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)☆68Updated 2 years ago
- Security Content for the PEAK Threat Hunting Framework☆39Updated last year
- A preconfigured Windows-based system designed for rapid forensic investigations in both Azure and AWS.☆38Updated last year
- Public tools, scripts or code snippets that can help when working with our products☆46Updated 5 months ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆45Updated 3 years ago
- Rhaegal is a tool written in Python 3 used to scan Windows Event Logs for suspicious logs. Rhaegal uses custom rule format to detect sus…☆41Updated 2 years ago
- ReWrite of AChoir in Go for Cross Platform☆41Updated last month
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆31Updated 8 months ago
- Linux Baseline and Forensic Triage Tool - BETA☆57Updated 3 years ago
- simple webapp for converting sigma rules into siem queries using the pySigma library☆51Updated 2 years ago
- A repo for centralizing ongoing research on the new Windows 10/11 DFIR artifact, EventTranscript.db.☆41Updated 3 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- Penguin OS Forensic (or Flight) Recorder☆40Updated 9 months ago
- This repository contains sample log data that were collected after running adversary simulations in Microsoft 365☆23Updated 11 months ago