freeload101 / SCRIPTS
☆148Updated 2 weeks ago
Related projects ⓘ
Alternatives and complementary repositories for SCRIPTS
- ☆66Updated 8 months ago
- Full of public notes and Utilities☆82Updated 2 months ago
- A PowerShell incident response script for quick triage☆75Updated 2 years ago
- Collection of PowerShell functinos and scripts a Blue Teamer might use☆84Updated last year
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆52Updated 2 years ago
- Get all my software☆141Updated last month
- ☆73Updated last year
- Detection Ideas & Rules repository.☆178Updated 3 years ago
- ☆1Updated 2 weeks ago
- Crack base64(sha256(username)) hash from Microsoft Event ID 1029☆18Updated last year
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆64Updated 2 years ago
- This repository was created to aid in the deployment/maintenance of the Sysmon service on a large number of computers.☆82Updated last year
- Pushes Sysmon Configs☆89Updated 3 years ago
- ☆70Updated 3 weeks ago
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆146Updated 2 years ago
- A curated list of KAPE-related resources☆155Updated 6 months ago
- ☆46Updated last year
- ☆84Updated 8 months ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆109Updated 11 months ago
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆36Updated 2 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆66Updated last year
- BulkStrike enables the usage of CrowdStrike Real Time Response (RTR) to bulk execute commands on multiple machines.☆41Updated last year
- This is a set of tools for doing forensics analysis on Microsoft ESE databases.☆123Updated 2 years ago
- ☆52Updated last year
- The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Of…☆245Updated 3 years ago
- Microsoft Threat Protection Advance Hunting Cheat Sheet☆78Updated 4 years ago
- Convert Sigma rules to LogRhythm searches☆19Updated 2 years ago
- Blueteam operational triage registry hunting/forensic tool.☆142Updated last year
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆66Updated 4 years ago
- Repository of SentinelOne Deep Visibility queries.☆118Updated 3 years ago