WithSecureLabs / LinuxCatScale
Incident Response collection and processing scripts with automated reporting scripts
☆291Updated 9 months ago
Alternatives and similar repositories for LinuxCatScale:
Users that are interested in LinuxCatScale are comparing it to the libraries listed below
- Blue Team detection lab created with Terraform and Ansible in Azure.☆149Updated 4 months ago
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆704Updated last month
- Threat Hunting tool about Sysmon and graphs☆330Updated last year
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆279Updated 7 months ago
- A repository of DFIR-related Mind Maps geared towards the visual learners!☆516Updated 2 years ago
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆557Updated 2 months ago
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆609Updated 9 months ago
- Rules generated from our investigations.☆192Updated this week
- Set of SIGMA rules (>350) mapped to MITRE ATT&CK tactic and techniques☆352Updated 2 months ago
- Rapidly Search and Hunt through Linux Forensics Artifacts☆188Updated last year
- Ransomware simulator written in Golang☆427Updated 2 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆201Updated 2 years ago
- 🧭 The artifactcollector is a customizable agent to collect forensic artifacts on any Windows, macOS or Linux system☆281Updated last month
- #ThreatHunting #DFIR #Malware #Detection Mind Maps☆290Updated 3 years ago
- A centralized and enhanced memory analysis platform☆434Updated last month
- Live forensic artifacts collector☆165Updated 8 months ago
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆184Updated 2 years ago
- A python script developed to process Windows memory images based on triage type.☆261Updated last year
- Automated YARA Rule Standardization and Quality Assurance Tool☆200Updated this week
- Documentation and scripts to properly enable Windows event logs.☆596Updated last year
- A collection of Splunk's Search Processing Language (SPL) for Threat Hunting with CrowdStrike Falcon☆198Updated 4 years ago
- Test the accuracy of Endpoint Detection and Response (EDR) software with simple script which executes various ATT&CK/LOLBAS/Invoke-Cradle…☆300Updated 3 years ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆235Updated 2 weeks ago
- MISP Playbooks☆188Updated last month
- MAL-CL (Malicious Command-Line)☆310Updated 2 years ago
- Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.☆165Updated this week
- Resources To Learn And Understand SIGMA Rules☆173Updated 2 years ago
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆151Updated 3 years ago
- ☆539Updated last year
- Some Threat Hunting queries useful for blue teamers☆125Updated 2 years ago