att / docker-forensics
Tools to assist in forensicating docker
☆77Updated 11 months ago
Related projects: ⓘ
- Security Onion Elastic Stack☆46Updated 3 years ago
- Invoke-LiveResponse☆145Updated 2 years ago
- Expert Investigation Guides☆50Updated 3 years ago
- A rewrite of mactime, a bodyfile reader☆33Updated last month
- InvestigationPlaybookSpec☆72Updated 6 years ago
- A collection of typical false positive indicators☆54Updated 3 years ago
- Extract common Windows artifacts from source images and VSCs☆65Updated 3 years ago
- Sandbox feature upgrade with the help of wrapped samples☆75Updated 6 years ago
- automate your MISP installs☆66Updated 4 years ago
- PowerShell No Agent Hunting☆107Updated 6 years ago
- Volatility plugins developed and maintained by the community☆21Updated 6 years ago
- Slides and Other Resources from my latest Talks and Presentations☆24Updated 3 years ago
- A community event for security researchers to share their favorite notebooks☆105Updated 7 months ago
- ☆34Updated 3 years ago
- Integrating Sysinternals Autoruns’ logs into Security Onion☆30Updated 7 months ago
- Recon Hunt Queries☆76Updated 3 years ago
- Monitoring tool for PasteBin-alike sites written in Python. Inspired by pastemon http://github.com/xme/pastemon☆43Updated 3 years ago
- PowerShell scripts for Hard Drive forensics and parsing Windows Artifacts☆56Updated 3 years ago
- Yet another registry parser☆128Updated 2 years ago
- ☆34Updated 3 years ago
- stoQ Public Plugins☆71Updated last year
- Tools for the Computer Incident Response Team☆141Updated 7 years ago
- A Splunk app with saved reports derived from Sigma rules☆72Updated 6 years ago
- A modern Python-3-based alternative to RegRipper☆184Updated 11 months ago
- misp-cloud - Cloud-ready images of MISP☆70Updated 2 years ago
- pollen - A command-line tool for interacting with TheHive☆34Updated 5 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆67Updated 10 months ago
- This is a logon script used to detect the theft of credentials by tools such as Mimikatz☆116Updated 9 years ago
- A system that creates a bogus web structure to entrap and delay web scanners☆52Updated 3 years ago
- Volatility plugins created by the author☆44Updated 8 years ago
- Repository of yara rules☆57Updated last year