cisagov / ioc-scannerLinks
Search a filesystem for indicators of compromise (IoC).
☆76Updated this week
Alternatives and similar repositories for ioc-scanner
Users that are interested in ioc-scanner are comparing it to the libraries listed below
Sorting:
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆223Updated 4 months ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆253Updated 2 years ago
- A GeoIP lookup utility utilizing ipinfo.io services.☆89Updated last year
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆71Updated 2 years ago
- ☆72Updated 2 years ago
- ☆55Updated 4 years ago
- ☆86Updated 4 months ago
- Get all my software☆166Updated 2 months ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆122Updated 4 years ago
- This is a set of tools for doing forensics analysis on Microsoft ESE databases.☆125Updated 3 years ago
- an awesome list of active defense resources☆124Updated 5 years ago
- A list of my personal projects☆178Updated 2 years ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆48Updated last month
- InsightVM helpful SQL queries☆69Updated 5 months ago
- A Windows event logging and collection baseline focused on finding balance between forensic value and optimising retention.☆289Updated 3 years ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆70Updated 5 years ago
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆26Updated last year
- CrowdStrike's Open Source Policy & Contribution Guide☆43Updated 4 months ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆115Updated 9 months ago
- Tools for simulating threats☆191Updated last year
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆67Updated last year
- Cybersecurity Incident Response Plan☆91Updated 4 years ago
- ☆76Updated last year
- The FASTEST way to consume threat intel.☆68Updated 2 years ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆93Updated 4 years ago
- ☆119Updated last year
- Digital Forensics Artifacts Knowledge Base☆84Updated last year
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆83Updated last year
- A port of BHIS's Backdoors & Breaches for playingcards.io☆64Updated 2 years ago
- Cast is an installer for any compatible Saltstack based distribution like SIFT or REMnux☆124Updated last week