fireeye / HXTool
HXTool is an extended user interface for the FireEye HX Endpoint product. HXTool can be installed on a dedicated server or on your physical workstation. HXTool provides additional features and capabilities over the standard FireEye HX web user interface. HXTool uses the fully documented REST API that comes with the FireEye HX for communication w…
☆79Updated 8 months ago
Alternatives and similar repositories for HXTool:
Users that are interested in HXTool are comparing it to the libraries listed below
- Blueteam operational triage registry hunting/forensic tool.☆145Updated last year
- Script for parsing Symantec Endpoint Protection logs, VBNs, and ccSubSDK database.☆64Updated 2 years ago
- Collection of useful, up to date, Carbon Black Response Queries☆83Updated 4 years ago
- ☆67Updated last month
- Detection Ideas & Rules repository.☆179Updated 3 years ago
- Random hunting ordiented yara rules☆95Updated last year
- ☆33Updated 5 months ago
- ☆86Updated last year
- ATT&CK Remote Threat Hunting Incident Response☆200Updated 3 months ago
- ☆77Updated 5 years ago
- My conference presentations☆66Updated last year
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆114Updated last year
- Sigma Detection Rule Repository☆87Updated 4 years ago
- A repo to document API functions mapped to security events across diverse platforms☆75Updated 5 years ago
- ☆5Updated 5 months ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆90Updated 3 years ago
- attack2jira automates the process of standing up a Jira environment that can be used to track and measure ATT&CK coverage☆111Updated last year
- List of PowerShell commands and commandlets that should be in your Powershel watchlist☆37Updated 3 years ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆85Updated 2 years ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆52Updated 2 years ago
- Extract BITS jobs from QMGR queue and store them as CSV records☆75Updated last month
- A library for fast parse & import of Windows Eventlogs into Elasticsearch.☆85Updated 8 months ago
- YARA rule analyzer to improve rule quality and performance☆97Updated 3 months ago
- Technical add-on for Splunk related to TheHive/Cortex from TheHive project☆53Updated last month
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆108Updated 5 years ago
- Active Directory Purple Team Playbook☆106Updated last year
- Import specific data sources into the Sigma generic and open signature format.☆77Updated 2 years ago
- A PowerShell incident response script for quick triage☆80Updated 2 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆109Updated 4 years ago
- ☆116Updated last year