ericw317 / TrailBytes
Follow the trail of breadcrumbs left behind by any user on a computer or mounted disk image.
☆30Updated 2 months ago
Alternatives and similar repositories for TrailBytes:
Users that are interested in TrailBytes are comparing it to the libraries listed below
- MS Graph Commands and Tools for Blue Teamers☆49Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆50Updated last year
- Contains compiled binaries of Volatility☆33Updated last month
- Linux Baseline and Forensic Triage Tool - BETA☆53Updated 2 years ago
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆51Updated 4 months ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated 6 months ago
- ☆34Updated last month
- ☆32Updated 10 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 2 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆32Updated 8 months ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆26Updated 8 months ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆33Updated last month
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- ☆32Updated last year
- Detection rule validation☆41Updated last year
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆120Updated this week
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆68Updated last month
- Advanced Email Threat Hunting w/ Detection as Code☆49Updated 2 weeks ago
- Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)☆68Updated last year
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆32Updated 2 months ago
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- A simple tool designed to create Atomic Red Team tests with ease.☆36Updated 2 months ago
- Assess Windows OS for security misconfigurations and hardening opportunities.☆31Updated 7 months ago
- Track C2 servers, tools, and botnets over time by framework and location☆36Updated last week
- Living Off Security Tools☆44Updated 3 months ago
- Placeholder for my detection repo and misc detection engineering content☆42Updated last year
- Powershell tools used for Red Team / Pentesting.☆74Updated last year
- A network logging tool that logs per process activities☆32Updated last year
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated last year