A Powershell script for frequency analysis of separated values data files.
☆17Jan 22, 2014Updated 12 years ago
Alternatives and similar repositories for Get-StakRank
Users that are interested in Get-StakRank are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Why hunt when you can seine?☆21May 12, 2015Updated 10 years ago
- ☆16Apr 16, 2017Updated 8 years ago
- Powershell tool to download malware samples.☆12Feb 10, 2016Updated 10 years ago
- ☆24Jan 12, 2026Updated 2 months ago
- Various DFIR Tools☆27Jul 23, 2018Updated 7 years ago
- Network Block Device Server for windows with a DFIR/forensic focus.☆96Mar 31, 2017Updated 8 years ago
- Maltego transform for OpenDNS Investigate API☆12Jan 6, 2015Updated 11 years ago
- Term concordances for each course in the SANS DFIR curriculum. Used for automated index generation.☆69Aug 7, 2020Updated 5 years ago
- Python script to pull various IOCs from PDFs☆15Dec 22, 2014Updated 11 years ago
- Find permanent WMI event consumers on endpoints that could be used by APT actors.☆17Jun 15, 2016Updated 9 years ago
- ircollect☆31Aug 7, 2013Updated 12 years ago
- A fork of David B Heise's VirusTotal Powershell Module☆17Mar 14, 2022Updated 4 years ago
- This repository is created to add value to existing Network Security Monitoring solutions.☆42Sep 20, 2016Updated 9 years ago
- Indices for courses in SANS' Network Security Operations curriculum☆17Feb 5, 2016Updated 10 years ago
- pan-stix☆19Oct 12, 2017Updated 8 years ago
- Extract files from captured TCP sessions. Support live streams and pcap files.☆49Feb 14, 2013Updated 13 years ago
- It is based on bulk_extractor (https://github.com/simsong/bulk_extractor) and add scanners for record carving☆42Apr 23, 2020Updated 5 years ago
- A python script to shift the timestamp on syslog data. Useful for forensicators combating time skew.☆21May 19, 2022Updated 3 years ago
- ☆121Oct 6, 2015Updated 10 years ago
- Generate STIX XML from OpenIOC XML☆95Oct 18, 2018Updated 7 years ago
- VMware Snapshot Forensic Comparison Scripts☆25Mar 19, 2013Updated 13 years ago
- A flexible, easy to use, automation framework allowing users to integrate their capabilities and devices to cut through the repetitive, t…☆12Nov 23, 2022Updated 3 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- Development guide for Volatility Plugins☆22Sep 6, 2017Updated 8 years ago
- Allows a user to grab documentation from online MSDN for a given function name in IDA, and import the documentation as a repeatable comme…☆15Jul 22, 2012Updated 13 years ago
- Various Docker Compose profiles to set up TheHive and Cortex for different use cases☆17Feb 6, 2026Updated last month
- Compiler Fingerprinting☆14Apr 24, 2015Updated 10 years ago
- STIX Schema Development☆75Aug 1, 2018Updated 7 years ago
- Public Landing Page☆16Jan 7, 2023Updated 3 years ago
- Splunk Add-on for Microsoft Azure☆11Dec 15, 2025Updated 3 months ago
- Volatility plugins created by the author☆44Oct 2, 2015Updated 10 years ago
- ☆50Aug 30, 2020Updated 5 years ago
- Common Vulnerability Scoring System (CVSS) made safe and highly efficient☆51Mar 17, 2026Updated last week
- ☆13Aug 17, 2020Updated 5 years ago
- Domain Top Level Checker☆11Jan 3, 2016Updated 10 years ago
- Validate STIX and CybOX XML documents☆26Feb 16, 2024Updated 2 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- Manipulate timestamps on NTFS☆53Nov 10, 2014Updated 11 years ago
- Windows Privilege Escalation☆10Dec 27, 2014Updated 11 years ago