certsocietegenerale / rAIdline
IR drill plateform
☆18Updated last month
Alternatives and similar repositories for rAIdline
Users that are interested in rAIdline are comparing it to the libraries listed below
Sorting:
- TIM is a Kusto investigation platform that enables a user to quickly pivot between data sources; annotate their findings; and promotes co…☆21Updated 9 months ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆33Updated 2 weeks ago
- Sigma detection rules for hunting with the threathunting-keywords project☆55Updated 2 months ago
- CarbonBlack EDR detection rules and response actions☆71Updated 8 months ago
- Convert Sigma rules to SIEM queries, directly in your browser.☆76Updated this week
- VelociraptorMCP is a Model Context Protocol bridge for exposing LLMs to MCP clients.☆25Updated last week
- Tools and scripts to deploy and manage OpenRelik instances☆13Updated 2 months ago
- A home for detection content developed by the delivr.to team☆69Updated 3 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆88Updated 6 months ago
- Finding ClickFix and FakeCAPTCHA like it's 1999☆36Updated this week
- Active C&C Detector☆154Updated last year
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆78Updated this week
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆123Updated last year
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆84Updated 3 months ago
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (EXT4, XFS) journals (not systemd-journald), generates…☆64Updated last month
- ☆36Updated last week
- An introduction to detection engineering☆13Updated 4 months ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆51Updated 6 months ago
- The ultimate repository for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆23Updated 3 weeks ago
- A pySigma wrapper to manage detection rules.☆39Updated last week
- Quick ESXi Log Parser☆19Updated 4 months ago
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆77Updated 11 months ago
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆27Updated 10 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated last year
- The core backend server handling API requests and task management☆39Updated this week
- A preconfigured Velociraptor triage collector☆51Updated this week
- Velociraptor Server hosted in Azure App Service☆42Updated last week
- custom Python script to perform Yara matching in Cortex XDR☆13Updated 4 years ago
- My Notes from Hugging Face AI Agents Course☆13Updated 3 months ago
- Yara Rules for Modern Malware☆77Updated last year