cisagov / ioc-scannerLinks
Search a filesystem for indicators of compromise (IoC).
☆81Updated last week
Alternatives and similar repositories for ioc-scanner
Users that are interested in ioc-scanner are comparing it to the libraries listed below
Sorting:
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆80Updated last month
- ☆73Updated 2 years ago
- A GeoIP lookup utility utilizing ipinfo.io services.☆92Updated 2 years ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆256Updated 2 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆129Updated 5 years ago
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆26Updated last year
- ☆55Updated 4 years ago
- ☆88Updated 9 months ago
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆245Updated 8 months ago
- ☆120Updated last month
- ☆79Updated 3 weeks ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆112Updated 3 years ago
- an awesome list of active defense resources☆127Updated 5 years ago
- Digital Forensics Artifacts Knowledge Base☆88Updated 2 weeks ago
- Tools for simulating threats☆197Updated 2 years ago
- ☆93Updated 2 weeks ago
- ☆33Updated 3 years ago
- CrowdStrike's Open Source Policy & Contribution Guide☆46Updated last week
- A port of BHIS's Backdoors & Breaches for playingcards.io☆64Updated 2 years ago
- ☆81Updated last year
- Import CrowdStrike Threat Intelligence into your instance of MISP☆49Updated 6 months ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆97Updated 4 years ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- InsightVM helpful SQL queries☆76Updated 9 months ago
- Docker image for Velocidex Velociraptor☆141Updated 9 months ago
- Get all my software☆179Updated 6 months ago
- Software downloads☆109Updated 7 months ago
- Conference presentations☆60Updated last month
- Collection of walkthroughs on various threat hunting techniques☆76Updated 5 years ago
- Creating a hardened "Blue Forest" with Server 2016/2019 Domain Controllers☆265Updated last year