dwmetz / CyberPipeLinks
An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.
☆342Updated 2 months ago
Alternatives and similar repositories for CyberPipe
Users that are interested in CyberPipe are comparing it to the libraries listed below
Sorting:
- A python script developed to process Windows memory images based on triage type.☆263Updated 2 years ago
- Repository of attack and defensive information for Business Email Compromise investigations☆275Updated 9 months ago
- MAL-CL (Malicious Command-Line)☆322Updated 3 years ago
- Some Threat Hunting queries useful for blue teamers☆131Updated 3 years ago
- Rules generated from our investigations.☆203Updated 7 months ago
- Harness the power of Splunk for your investigations☆149Updated 4 months ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆176Updated last year
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆85Updated 3 years ago
- Some important DFIR Resources☆84Updated 2 years ago
- Repository of public reference frameworks for the DFIR community.☆121Updated 2 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆207Updated 3 years ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆162Updated 10 months ago
- A curated list of KAPE-related resources☆179Updated 9 months ago
- PowerShell module for Office 365 and Azure log collection☆280Updated 4 months ago
- ☆194Updated 2 years ago
- Tools for simulating threats☆199Updated 2 years ago
- Powershell module for VMWare vSphere forensics☆158Updated last year
- ☆65Updated 4 months ago
- A repository to share publicly available Velociraptor detection content☆196Updated this week
- Incident Response documents and tooling☆111Updated last month
- A repo hosting the Markua content for the EZ Tools manuals hosted on Leanpub☆87Updated 6 months ago
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆189Updated 3 years ago
- Full of public notes and Utilities☆130Updated last month
- Windows Malware Investigation Scripts & Docs☆85Updated last year
- OneDriveExplorer is a command line and GUI based application for reconstructing the folder structure of OneDrive from the <UserCid>.dat a…☆226Updated last month
- #ThreatHunting #DFIR #Malware #Detection Mind Maps☆306Updated 4 years ago
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆142Updated last year
- ☆14Updated last year
- Sigma rules to share with the community☆124Updated last year
- MISP Playbooks☆222Updated 3 months ago