codeyourweb / fastfinderLinks
Incident Response - Fast suspicious file finder
☆247Updated last week
Alternatives and similar repositories for fastfinder
Users that are interested in fastfinder are comparing it to the libraries listed below
Sorting:
- Live forensic artifacts collector☆173Updated last year
- Threat Hunting queries for various attacks☆243Updated this week
- Threat Hunting tool about Sysmon and graphs☆335Updated 2 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆104Updated last month
- Linux Evidence Acquisition Framework☆117Updated last year
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 10 months ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 3 years ago
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆156Updated 4 years ago
- Incident Response collection and processing scripts with automated reporting scripts☆319Updated last year
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆170Updated 3 years ago
- ☆70Updated 4 years ago
- yara detection rules for hunting with the threathunting-keywords project☆157Updated 7 months ago
- ☆194Updated last year
- Suricata rules for network anomaly detection☆180Updated last month
- ☆45Updated 3 years ago
- Tool to discover external and internal network attack surface☆204Updated last year
- MAL-CL (Malicious Command-Line)☆323Updated 3 years ago
- Data visualization for blue teams☆127Updated 2 years ago
- Evtx to Splunk ingestor☆15Updated 3 years ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆251Updated 2 months ago
- Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.☆211Updated 2 weeks ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆175Updated last year
- Active C2 IoCs☆99Updated 3 years ago
- #ThreatHunting #DFIR #Malware #Detection Mind Maps☆305Updated 4 years ago
- Rapidly Search and Hunt through Linux Forensics Artifacts☆201Updated 2 years ago
- Source code used at TweetFeed.live☆47Updated 3 years ago
- Initial triage of Windows Event logs☆105Updated last year
- Code and yara rules to detect and analyze Cobalt Strike☆272Updated 4 years ago
- This script is made to collect the most valiable artifacts for foreniscs or incident reponse investigation rather than imaging the whole …☆210Updated 5 years ago
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆189Updated 3 years ago