freeload101 / CrowdStrike_RTR_Powershell_Scripts
☆69Updated last year
Alternatives and similar repositories for CrowdStrike_RTR_Powershell_Scripts:
Users that are interested in CrowdStrike_RTR_Powershell_Scripts are comparing it to the libraries listed below
- ☆57Updated last year
- A PowerShell incident response script for quick triage☆80Updated 2 years ago
- ☆72Updated 6 months ago
- ☆26Updated 3 years ago
- BulkStrike enables the usage of CrowdStrike Real Time Response (RTR) to bulk execute commands on multiple machines.☆42Updated 2 years ago
- Repository of SentinelOne Deep Visibility queries.☆126Updated 3 years ago
- Provides an advanced input.conf file for Windows and 3rd party related software with more than 70 different event log mapped to the MITRE…☆90Updated 2 months ago
- ☆41Updated 11 months ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆114Updated last year
- ☆41Updated 2 years ago
- Notes on responding to security breaches relating to Azure AD☆110Updated 3 years ago
- Real-time Response scripts and schema☆110Updated last year
- Full of public notes and Utilities☆98Updated 2 months ago
- Collection of PowerShell functinos and scripts a Blue Teamer might use☆83Updated last year
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆65Updated 3 years ago
- ☆83Updated last month
- SentinelOne STAR Rules☆59Updated 2 months ago
- MISP to Sentinel integration☆64Updated 2 weeks ago
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆37Updated 3 years ago
- Jupyter notebooks for threat hunting☆55Updated 3 weeks ago
- A collection of Splunk's Search Processing Language (SPL) for Threat Hunting with CrowdStrike Falcon☆201Updated 4 years ago
- Tool to extract Sessions, MessageID(s) and find the emails belonging to MessageID(s). This script utilizes the MailItemsAccessed features…☆39Updated 4 years ago
- Pushes Sysmon Configs☆88Updated 3 years ago
- ☆33Updated 2 years ago
- A collection of various SIEM rules relating to malware family groups.☆66Updated 10 months ago
- Repository of attack and defensive information for Business Email Compromise investigations☆250Updated 2 months ago
- Conference presentations☆47Updated last year
- ☆14Updated 6 months ago
- ☆87Updated last year
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆84Updated 2 months ago