codeyourweb / fastfinderLinks
Incident Response - Fast suspicious file finder
☆245Updated 3 years ago
Alternatives and similar repositories for fastfinder
Users that are interested in fastfinder are comparing it to the libraries listed below
Sorting:
- Live forensic artifacts collector☆169Updated last year
- Threat Hunting queries for various attacks☆238Updated this week
- yara detection rules for hunting with the threathunting-keywords project☆126Updated 2 months ago
- ☆197Updated last year
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 3 years ago
- Threat Hunting tool about Sysmon and graphs☆334Updated 2 years ago
- MAL-CL (Malicious Command-Line)☆315Updated 2 years ago
- Linux Evidence Acquisition Framework☆119Updated 10 months ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆94Updated 3 weeks ago
- ☆68Updated 4 years ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆245Updated 4 months ago
- Incident Response collection and processing scripts with automated reporting scripts☆305Updated last year
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 5 months ago
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆155Updated 3 years ago
- Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.☆189Updated this week
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆169Updated 2 years ago
- ☆160Updated last year
- Initial triage of Windows Event logs☆102Updated last year
- A collection of intelligence about Log4Shell and its exploitation activity.☆183Updated 3 years ago
- Evtx to Splunk ingestor☆15Updated 3 years ago
- Tool to discover external and internal network attack surface☆200Updated last year
- Data visualization for blue teams☆126Updated 2 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 3 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆204Updated 3 years ago
- This script is made to collect the most valiable artifacts for foreniscs or incident reponse investigation rather than imaging the whole …☆201Updated 4 years ago
- Open IOC sharing platform☆59Updated 8 months ago
- Source code used at TweetFeed.live☆44Updated 2 years ago
- ☆130Updated last year
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆327Updated 3 months ago
- #ThreatHunting #DFIR #Malware #Detection Mind Maps☆299Updated 3 years ago