activecm / espy
Endpoint detection for remote hosts for consumption by RITA and Elasticsearch
☆70Updated last year
Alternatives and similar repositories for espy:
Users that are interested in espy are comparing it to the libraries listed below
- ☆72Updated 5 months ago
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆114Updated last year
- A PowerShell incident response script for quick triage☆80Updated 2 years ago
- Collection of PowerShell functinos and scripts a Blue Teamer might use☆83Updated last year
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆53Updated 2 years ago
- Powershell - web traffic whitenoise generator☆47Updated 4 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- Repository for SPEED SIEM Use Case Framework☆53Updated 4 years ago
- ☆77Updated 5 years ago
- Full of public notes and Utilities☆98Updated 2 months ago
- ☆41Updated last year
- A collection of tips for using MISP.☆74Updated 4 months ago
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆37Updated 3 years ago
- ☆65Updated last month
- Defensive Origins Training Schedule☆38Updated last year
- Jupyter notebooks for threat hunting☆55Updated 2 weeks ago
- ☆54Updated 3 years ago
- Python library for threat intelligence☆86Updated 3 months ago
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆25Updated 11 months ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆69Updated 4 years ago
- Defence Against the Dark Arts☆34Updated 5 years ago
- Cybersecurity Incident Response Plan☆90Updated 4 years ago
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆65Updated 3 years ago
- ☆6Updated 5 months ago
- ☆57Updated last year
- A GeoIP lookup utility utilizing ipinfo.io services.☆86Updated last year
- ☆73Updated 2 years ago
- A curated list of awesome threat detection and hunting resources☆16Updated 6 years ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆81Updated last year