WithSecureLabs / iocs
☆14Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for iocs
- ☆19Updated last year
- Cyber Threats Detection Rules☆13Updated 2 months ago
- my MSTICpy practice and custom tools repository☆11Updated 2 weeks ago
- ☆18Updated 2 years ago
- Just Another broken Registry Parser (JARP)☆16Updated 6 months ago
- Library of threat hunts to get any user started!☆40Updated 4 years ago
- This repository contains sample log data that were collected after running adversary simulations in Microsoft 365☆20Updated last month
- ☆14Updated last year
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated last year
- A web scraper to create MISP events and reports☆14Updated last year
- USN Journal full path builder☆36Updated 2 months ago
- Logbook for Digital Forensics and Incident Response☆49Updated 4 months ago
- CryptnetURLCacheParser is a tool to parse CryptAPI cache files☆16Updated 3 months ago
- Penguin OS Forensic (or Flight) Recorder☆37Updated 4 months ago
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆31Updated 2 years ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated last year
- A collection of Terraform and Ansible scripts that automatically (and quickly) deploys a small Velociraptor R&D lab.☆20Updated 3 years ago
- Windows file metadata / forensic tool.☆15Updated 2 months ago
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆25Updated 2 years ago
- Sigma detection rules for hunting with the threathunting-keywords project☆47Updated 3 weeks ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆27Updated last month
- A repo for centralizing ongoing research on the new Windows 10/11 DFIR artifact, EventTranscript.db.☆39Updated 2 years ago
- Creating a Feed of MISP Events from ThreatFox (by abuse.ch)☆19Updated 3 years ago
- Knowing which rule should trigger according to the redcannary test☆10Updated 6 months ago
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆18Updated last year
- A sample VHDX file with multiple verbose examples of forensic and anti-forensics artifacts. Meant to be basic and can be expanded upon. P…☆25Updated last year
- Scripts and lists to help generate YARA friendly string mutations☆19Updated last year
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆31Updated last month
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆44Updated 2 years ago
- VTC - Velociraptor Timeline Creator☆15Updated 6 months ago