elastic / sans-dfir-2022Links
Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"
☆11Updated 4 months ago
Alternatives and similar repositories for sans-dfir-2022
Users that are interested in sans-dfir-2022 are comparing it to the libraries listed below
Sorting:
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆12Updated 9 months ago
- ☆21Updated 2 months ago
- my MSTICpy practice and custom tools repository☆11Updated last month
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- ☆21Updated 2 years ago
- Quick ESXi Log Parser☆21Updated 5 months ago
- Scripts to for ready-to-use Velociraptor instance deployment in Azure☆14Updated last year
- Just Another broken Registry Parser (JARP)☆16Updated last year
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆20Updated last year
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 3 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆36Updated last year
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- Git for me to put all my forensics stuff☆22Updated 4 months ago
- ☆19Updated 3 years ago
- ESXi Cyber Security Incident Response Script☆22Updated 9 months ago
- ☆11Updated last year
- Notes from my "Implementing a Kick-Butt Training Program: Blue Team GO!" talk☆12Updated 6 years ago
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆27Updated 2 years ago
- A completely unsupported set of scripts used in SANS FOR572, Advanced Network Forensics and Analysis☆27Updated last week
- Threat Box Assessment Tool☆19Updated 3 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated last year
- ☆10Updated last year
- Converts Sigma detection rules to a Splunk alert configuration.☆13Updated 3 years ago
- ☆14Updated 2 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Updated 4 years ago
- A project that aims to automate Volatility3 at scale with the use of cloud strength and the power of KQL inside ADX.☆16Updated 5 months ago
- VelociraptorMCP is a Model Context Protocol bridge for exposing LLMs to MCP clients.☆28Updated last week
- This repository contains sample log data that were collected after running adversary simulations in Microsoft 365☆20Updated 7 months ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Updated 3 years ago
- Mass Triage Tools☆20Updated 3 months ago