fireeye / HXTool
HXTool is an extended user interface for the FireEye HX Endpoint product. HXTool can be installed on a dedicated server or on your physical workstation. HXTool provides additional features and capabilities over the standard FireEye HX web user interface. HXTool uses the fully documented REST API that comes with the FireEye HX for communication w…
☆79Updated 10 months ago
Alternatives and similar repositories for HXTool:
Users that are interested in HXTool are comparing it to the libraries listed below
- Script for parsing Symantec Endpoint Protection logs, VBNs, and ccSubSDK database.☆64Updated 2 years ago
- ☆68Updated 2 months ago
- ☆87Updated last year
- Blueteam operational triage registry hunting/forensic tool.☆145Updated last year
- Digital Forensics Artifacts Knowledge Base☆81Updated 11 months ago
- Random hunting ordiented yara rules☆96Updated 2 years ago
- Hunt malware with Volatility☆47Updated last year
- Collection of useful, up to date, Carbon Black Response Queries☆83Updated 4 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆85Updated 2 years ago
- ☆49Updated last year
- ☆34Updated 6 months ago
- Invoke-LiveResponse☆147Updated 3 years ago
- YARA rule analyzer to improve rule quality and performance☆99Updated last month
- Automagically extract forensic timeline from volatile memory dump☆130Updated last year
- ☆116Updated last year
- Sigma Detection Rule Repository☆87Updated 4 years ago
- Cloud Templates and scripts to deploy mordor environments☆129Updated 4 years ago
- Detection Ideas & Rules repository.☆179Updated 3 years ago
- My conference presentations☆66Updated last year
- ATT&CK Remote Threat Hunting Incident Response☆200Updated 5 months ago
- Dump of organized knowledge on DFIR☆134Updated 3 years ago
- Import specific data sources into the Sigma generic and open signature format.☆78Updated 3 years ago
- A library for fast parse & import of Windows Eventlogs into Elasticsearch.☆85Updated last week
- OSSEM Data Dictionaries☆59Updated 3 months ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆44Updated 3 years ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆63Updated 2 years ago
- Mapping your datasources and detections to the MITRE ATT&CK Navigator framework.☆58Updated 4 years ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆114Updated last year
- Community modules for FAME☆65Updated 3 months ago