ashemery / WindowsDFIR
Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or events.
☆77Updated 3 years ago
Alternatives and similar repositories for WindowsDFIR:
Users that are interested in WindowsDFIR are comparing it to the libraries listed below
- This repo is where I store my Threat Hunting ideas/content☆87Updated last year
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆94Updated last year
- A repo hosting the Markua content for the EZ Tools manuals hosted on Leanpub☆66Updated last year
- An exercise to practice deobfuscating PowerShell Scripts.☆28Updated 2 years ago
- ☆63Updated 3 years ago
- ☆50Updated 2 months ago
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆65Updated 3 years ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 10 months ago
- Full of public notes and Utilities☆98Updated last month
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆112Updated last year
- Memory Baseliner is a script that can compare two windows memory images or perform frequency of occurrence / data stacking analysis on mu…☆52Updated last year
- ☆86Updated last year
- Blueteam operational triage registry hunting/forensic tool.☆145Updated last year
- A GUI to query the API of abuse.ch.☆70Updated 2 years ago
- ☆34Updated last year
- Cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for them☆27Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 3 months ago
- CarbonBlack EDR detection rules and response actions☆71Updated 6 months ago
- Simple PowerShell script to enable process scanning with Yara.☆91Updated 2 years ago
- IOC Collection 2022☆57Updated 2 years ago
- Reads and prints information from the website MalAPI.io☆38Updated 3 years ago
- Active C&C Detector☆152Updated last year
- Detection of obfuscated Powershell commands☆54Updated last year
- The Github project for The Defender's Guide by Luke Paine and Jonathan Johnson☆151Updated last year
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)☆68Updated last year
- ☆65Updated 2 years ago
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆149Updated last year
- Default Detections for EDR☆96Updated last year
- Slides of my public talks☆54Updated last year