chocolatecoat / DFIR-Templates
Incident Response documents and tooling
☆63Updated last year
Related projects ⓘ
Alternatives and complementary repositories for DFIR-Templates
- This repository contains helper scripts and custom configs to get the best out of Google's Timesketch project.☆94Updated last year
- ☆1Updated 3 weeks ago
- Harness the power of Splunk for your investigations☆77Updated this week
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆76Updated last week
- A repository to share publicly available Velociraptor detection content☆119Updated this week
- ☆50Updated 6 months ago
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆75Updated 6 months ago
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆139Updated this week
- Forensics scripts aimed at automating & enhancing the Forensics Legend Eric Zimmerman's techniques, integrating the statistical detection…☆16Updated last year
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆116Updated 11 months ago
- An opensource sigma conversion tool built using pysigma☆100Updated this week
- Full of public notes and Utilities☆86Updated this week
- A curated list of KAPE-related resources☆156Updated 6 months ago
- Repository of public reference frameworks for the DFIR community.☆109Updated last year
- ☆57Updated 3 weeks ago
- The Threat Actor Profile Guide for CTI Analysts☆97Updated last year
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆148Updated 6 months ago
- ☆41Updated 6 months ago
- Some important DFIR Resources☆82Updated last year
- Remote access and Antivirus Logging Database☆41Updated 6 months ago
- A repository of my own Sigma detection rules.☆156Updated 2 months ago
- User Feedback Space of #MitreAssistant☆37Updated last year
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆97Updated this week
- ☆85Updated 9 months ago
- Memory Baseliner is a script that can compare two windows memory images or perform frequency of occurrence / data stacking analysis on mu…☆49Updated last year
- A script that updates KAPE (using Get-KAPEUpdate.ps1) as well as EZ Tools (within .\KAPE\Modules\bin) and the ancillary files that enhanc…☆53Updated last year
- Cyber Underground General Intelligence Requirements☆89Updated 9 months ago
- ☆63Updated last year
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆85Updated last year
- A repo hosting the Markua content for the EZ Tools manuals hosted on Leanpub☆63Updated last year