codeyourweb / fastfinderLinks
Incident Response - Fast suspicious file finder
☆248Updated last week
Alternatives and similar repositories for fastfinder
Users that are interested in fastfinder are comparing it to the libraries listed below
Sorting:
- Live forensic artifacts collector☆172Updated last year
- Threat Hunting queries for various attacks☆244Updated 2 weeks ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆140Updated 11 months ago
- Incident Response collection and processing scripts with automated reporting scripts☆319Updated last year
- Cyber Threat Intelligence Data, Indicators, and Analysis☆107Updated last week
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 3 years ago
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆158Updated 4 years ago
- Tool to discover external and internal network attack surface☆203Updated last year
- Linux Evidence Acquisition Framework☆117Updated last year
- ☆194Updated last year
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆252Updated 3 months ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆168Updated 3 years ago
- Threat Hunting tool about Sysmon and graphs☆335Updated 2 years ago
- MAL-CL (Malicious Command-Line)☆322Updated 3 years ago
- #ThreatHunting #DFIR #Malware #Detection Mind Maps☆306Updated 4 years ago
- A collection of intelligence about Log4Shell and its exploitation activity.☆184Updated 3 years ago
- ☆69Updated 4 years ago
- This script is made to collect the most valiable artifacts for foreniscs or incident reponse investigation rather than imaging the whole …☆210Updated 5 years ago
- Data visualization for blue teams☆126Updated 3 years ago
- yara detection rules for hunting with the threathunting-keywords project☆157Updated 8 months ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆176Updated last year
- ☆44Updated 3 years ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆94Updated 3 years ago
- ☆160Updated 2 years ago
- Active C2 IoCs☆99Updated 3 years ago
- Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.☆213Updated last week
- Rapidly Search and Hunt through Linux Forensics Artifacts☆201Updated 2 years ago
- 🧭 The artifactcollector is a customizable agent to collect forensic artifacts on any Windows, macOS or Linux system☆302Updated 8 months ago
- Initial triage of Windows Event logs☆105Updated last year
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆189Updated 3 years ago