cisagov / ioc-scannerLinks
Search a filesystem for indicators of compromise (IoC).
☆81Updated 2 weeks ago
Alternatives and similar repositories for ioc-scanner
Users that are interested in ioc-scanner are comparing it to the libraries listed below
Sorting:
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆76Updated 2 weeks ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆126Updated 5 years ago
- ☆72Updated 2 years ago
- ☆87Updated 7 months ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆254Updated 2 years ago
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆238Updated 7 months ago
- ☆55Updated 4 years ago
- CrowdStrike's Open Source Policy & Contribution Guide☆45Updated 3 weeks ago
- ☆119Updated 2 years ago
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆26Updated last year
- an awesome list of active defense resources☆126Updated 5 years ago
- A GeoIP lookup utility utilizing ipinfo.io services.☆92Updated last year
- Conference presentations☆59Updated last week
- Tools for simulating threats☆193Updated 2 years ago
- Threat Hunting & Incident Investigation with Osquery☆216Updated 3 years ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆72Updated 5 years ago
- Corelight@Home script☆44Updated 2 years ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆112Updated 3 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆103Updated last year
- Extracts fields from zeek logs, compatible with zeek-cut☆23Updated last year
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆116Updated last year
- Creating a hardened "Blue Forest" with Server 2016/2019 Domain Controllers☆263Updated last year
- Collection of useful Canary tools☆92Updated 2 weeks ago
- A port of BHIS's Backdoors & Breaches for playingcards.io☆64Updated 2 years ago
- This is a set of tools for doing forensics analysis on Microsoft ESE databases.☆126Updated 3 years ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆67Updated last year
- Collection of walkthroughs on various threat hunting techniques☆75Updated 5 years ago
- The FASTEST way to consume threat intel.☆69Updated 2 years ago
- Notes on managing and coordinating the response to major cyber incidents☆41Updated 5 years ago
- List of helpful publicly available CrowdStrike material.☆45Updated 11 months ago