Yamato-Security / sigma-to-hayabusa-converterLinks
Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.
☆13Updated 5 months ago
Alternatives and similar repositories for sigma-to-hayabusa-converter
Users that are interested in sigma-to-hayabusa-converter are comparing it to the libraries listed below
Sorting:
- ☆18Updated 3 months ago
- ESXi Cyber Security Incident Response Script☆24Updated 10 months ago
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated 3 weeks ago
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆27Updated 2 years ago
- ☆22Updated 9 months ago
- Tools and scripts to deploy and manage OpenRelik instances☆14Updated last month
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆36Updated 2 years ago
- Public tools, scripts or code snippets that can help when working with our products☆46Updated 2 months ago
- VTC - Velociraptor Timeline Creator☆18Updated last year
- Detection rule validation☆41Updated last year
- Quick ESXi Log Parser☆22Updated 6 months ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Updated 5 months ago
- A project that aims to automate Volatility3 at scale with the use of cloud strength and the power of KQL inside ADX.☆16Updated 7 months ago
- ☆11Updated 2 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆52Updated 7 months ago
- Hunt for SQLite files used by various applications☆26Updated last week
- Malformed Access Log to CSV - Convert Web Server Access Logs to CSV☆17Updated 10 months ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆31Updated 5 months ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆33Updated 3 weeks ago
- Contains compiled binaries of Volatility☆34Updated 2 months ago
- This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malwar…☆31Updated 3 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆64Updated 2 years ago
- Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.☆54Updated last month
- A web scraper to create MISP events and reports☆16Updated 2 weeks ago
- A simple script to read the contents of a zip/tar/folder and extract metadata☆22Updated 3 months ago
- NTFS file system specimens☆13Updated 2 years ago
- Sample evtx files to use for testing hayabusa detection rules☆58Updated 8 months ago
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (ext4, XFS) journals (not systemd-journald logs), gene…☆76Updated this week
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated 11 months ago