fireeye / CVE-2021-44228
OpenIOC rules to facilitate hunting for indicators of compromise
☆37Updated 3 years ago
Alternatives and similar repositories for CVE-2021-44228:
Users that are interested in CVE-2021-44228 are comparing it to the libraries listed below
- CSIRT Jump Bag☆26Updated last year
- Powershell Scripts to work on Crowdstrike Falcon that pull back raw data relevant to forensic investigation☆22Updated 4 months ago
- Track progress and keep notes while working through likethecoins' CTI Self Study Plan☆28Updated 2 years ago
- Ingesting Shodan Monitor Alerts to Microsoft Sentinel☆34Updated last year
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆37Updated 3 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 3 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 3 years ago
- ☆47Updated 3 weeks ago
- ☆41Updated 2 years ago
- ☆118Updated last year
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆40Updated last year
- Easily create index of your SANS books☆15Updated 2 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Updated 6 years ago
- Conference presentations☆47Updated last year
- ☆41Updated last year
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆44Updated 4 years ago
- Threat Hunter's Knowledge Base☆22Updated 3 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- Random tips and tricks RE: ransomware☆14Updated 3 years ago
- Repository for SPEED SIEM Use Case Framework☆53Updated 5 years ago
- Recon Hunt Queries☆77Updated 3 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- ReWrite of AChoir in Go for Cross Platform☆41Updated 2 months ago
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated 3 weeks ago
- Python library for threat intelligence☆86Updated 3 months ago
- Defensive Origins Training Schedule☆38Updated last year
- ☆29Updated 4 years ago
- Azure function to insert MISP data in to Azure Sentinel☆32Updated 2 years ago
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆65Updated 3 years ago