ecapuano / gsuite-login-geoipLinks
A script to analyze geographic GSuite Login activity
☆10Updated 8 years ago
Alternatives and similar repositories for gsuite-login-geoip
Users that are interested in gsuite-login-geoip are comparing it to the libraries listed below
Sorting:
- Log Examination Tool☆27Updated 9 years ago
- Collecting & Hunting for IOCs with gusto and style☆117Updated 7 years ago
- ☆36Updated 9 years ago
- Harbinger Threat Intelligence☆83Updated 10 years ago
- InvestigationPlaybookSpec☆71Updated 8 years ago
- PowerShell script utilized to pull several forensic artifacts from a live Win7 and WinXP system without WINRM.☆51Updated 8 years ago
- Script for generating Bro intel files from pdf or html reports☆77Updated 10 years ago
- ☆15Updated 10 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆60Updated 6 years ago
- Beholder is a shell script which installs and configures essentials to peer into your network activity.☆19Updated 8 years ago
- Unification of dnstwist + SQLite + Email reporting. Set it as a cron job that runs every hour, give it a list of domains and email addres…☆67Updated 7 years ago
- Carbonblack Live Response from the comfort of your own terminal☆20Updated 10 years ago
- Command line interface to Carbon Black Response☆38Updated 5 years ago
- ELK configuration files for Forensic Analysts and Incident Handlers (unmaintained)☆179Updated 6 years ago
- Parse a report and import the events into MISP☆30Updated 10 years ago
- CrowdStrike Falcon Orchestrator provides automated workflow and response capabilities☆188Updated 2 years ago
- Docker container for MISP☆96Updated 7 years ago
- Python tools for IOC (Indicator of Compromise) handling☆96Updated 4 years ago
- Carbon Black API Resources☆93Updated 8 years ago
- ☆64Updated 3 years ago
- Threat Feed Aggregation, Made Easy☆169Updated 5 years ago
- Python script to decode common encoded PowerShell scripts☆217Updated 7 years ago
- Various public documents, white-papers, articles, data, analysis, and statistics about breaches and security trends.☆92Updated 6 years ago
- Virustotal Lookup filter for Logstash☆16Updated 8 years ago
- PowerShell No Agent Hunting☆111Updated 7 years ago
- Office365 Log Analysis Framework☆81Updated 6 years ago
- a Malware/Threat Analyst Desktop☆89Updated 10 years ago
- A set of templates for documenting threat intelligence☆75Updated 12 years ago
- ☆18Updated 10 years ago
- Assorted classes and methods for indexing reports and retrieving information from an elastic index☆21Updated 9 years ago