Yamato-Security / takajo
Takajō (鷹匠) is a Hayabusa results analyzer.
☆117Updated last week
Alternatives and similar repositories for takajo
Users that are interested in takajo are comparing it to the libraries listed below
Sorting:
- Harness the power of Splunk for your investigations☆105Updated this week
- Sample evtx files to use for testing hayabusa detection rules☆54Updated 6 months ago
- A repository to share publicly available Velociraptor detection content☆163Updated last week
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (EXT4, XFS) journals (not systemd-journald), generates…☆64Updated last month
- This repository contains helper scripts and custom configs to get the best out of Google's Timesketch project.☆109Updated last year
- Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.☆177Updated this week
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆84Updated 3 months ago
- Parses USB connection artifacts from offline Registry hives☆98Updated 3 months ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆156Updated last month
- Memory Baseliner is a script that can compare two windows memory images or perform frequency of occurrence / data stacking analysis on mu…☆53Updated last year
- Search Index Database Reporter☆109Updated 6 months ago
- A repository of my own Sigma detection rules.☆158Updated 8 months ago
- LotL RMM☆182Updated last month
- CarbonBlack EDR detection rules and response actions☆71Updated 8 months ago
- Sigma rules to share with the community☆121Updated 3 months ago
- ☆68Updated 5 months ago
- USN Journal full path builder☆59Updated 8 months ago
- MITRE ATT&CK mapped queries for SentinelOne Deep Visiblity☆90Updated 4 years ago
- An opensource sigma conversion tool built using pysigma☆126Updated 4 months ago
- The Github project for The Defender's Guide by Luke Paine and Jonathan Johnson☆152Updated last year
- Forensic Artifact Collection Tool Matrix☆84Updated 6 months ago
- Repository of attack and defensive information for Business Email Compromise investigations☆251Updated last week
- Active C&C Detector☆154Updated last year
- Rules generated from our investigations.☆195Updated last month
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆153Updated 2 months ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆80Updated this week
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆103Updated 7 months ago
- ☆69Updated 2 months ago
- SentinelOne STAR Rules☆60Updated 3 months ago
- ☆7Updated 6 months ago