b3b0 / snipehuntLinks
π¦π¬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.
β11Updated 5 years ago
Alternatives and similar repositories for snipehunt
Users that are interested in snipehunt are comparing it to the libraries listed below
Sorting:
- PowerShell Memory Pulling scriptβ19Updated 10 years ago
- Notebooks created to attack and secure Active Directory environmentsβ27Updated 5 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.β23Updated 9 years ago
- Generic Signature Format for SIEM Systemsβ14Updated 3 years ago
- Traceroute improved wrapper for CSIRT and CERT operatorsβ38Updated last year
- A script to assist in processing forensic RAM captures for malware triageβ27Updated 4 years ago
- This repository is a curated list of pro bono incident response entities.β21Updated 2 years ago
- β13Updated 6 years ago
- β30Updated 6 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whicβ¦β56Updated 7 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)β13Updated this week
- A few quick recipes for those that do not have much time during the dayβ22Updated 11 months ago
- Audit Powershell and search from known keywords in history #Blueteamβ25Updated 5 years ago
- Bolster NEO API - Artificial intelligence based zero-hour phishing detectionβ14Updated 4 years ago
- My personal experience in Threat Hunting and knowledge gained so far.β19Updated 8 years ago
- Snapshot, patch, health-check, and potentially roll-back Windows VMsβ34Updated 7 years ago
- HoneyDB Python Moduleβ14Updated last year
- A few scripts I put together for testing purposes and to automate a few capabilities while doing IR. These scripts are also part of my blβ¦β55Updated 7 years ago
- This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.β34Updated 6 years ago
- Indices for courses in SANS' Network Security Operations curriculumβ16Updated 9 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.β24Updated last year
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.β35Updated 3 years ago
- A simple many-rules to many-files YARA scanner for incident response or malware zoos.β26Updated 7 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threaβ¦β18Updated 5 years ago
- β21Updated 2 years ago
- Passive Network Audit Frameworkβ32Updated 7 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's APIβ31Updated 3 years ago
- Create a MS Word index file from PowerPoint notes and slidesβ45Updated last month
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.β14Updated 7 years ago
- Collection of best practices to add OSINT into MISP and/or MISP communitiesβ66Updated 2 years ago