freeload101 / SCRIPTSLinks
☆169Updated this week
Alternatives and similar repositories for SCRIPTS
Users that are interested in SCRIPTS are comparing it to the libraries listed below
Sorting:
- ☆82Updated last year
- A PowerShell incident response script for quick triage☆81Updated 3 years ago
- Collection of PowerShell functinos and scripts a Blue Teamer might use☆89Updated 2 years ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆115Updated 2 years ago
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆156Updated 4 years ago
- Powershell module for VMWare vSphere forensics☆157Updated last year
- This script is made to collect the most valiable artifacts for foreniscs or incident reponse investigation rather than imaging the whole …☆208Updated 5 years ago
- A python script developed to process Windows memory images based on triage type.☆265Updated 2 years ago
- Pushes Sysmon Configs☆88Updated 4 years ago
- This is a set of tools for doing forensics analysis on Microsoft ESE databases.☆126Updated 3 years ago
- Get all my software☆180Updated 6 months ago
- Script to automate Linux live evidence collection☆28Updated 3 years ago
- Provides an advanced input.conf file for Windows and 3rd party related software with more than 70 different event log mapped to the MITRE…☆93Updated 5 months ago
- Detection Ideas & Rules repository.☆178Updated 4 years ago
- ☆88Updated 4 months ago
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆37Updated 3 years ago
- A script that updates KAPE (using Get-KAPEUpdate.ps1) as well as EZ Tools (within .\KAPE\Modules\bin) and the ancillary files that enhanc…☆59Updated 5 months ago
- The Office 365 Extractor is a tool that allows for complete and reliable extraction of the Unified Audit Log (UAL)☆264Updated 3 years ago
- ☆13Updated last year
- ☆66Updated 2 years ago
- Jupyter notebooks for threat hunting☆60Updated 8 months ago
- ☆75Updated last year
- Full of public notes and Utilities☆129Updated 10 months ago
- ☆42Updated 2 years ago
- The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Of…☆264Updated 4 years ago
- Get-MiniTimeline - Triage Collection and Timeline Generation w/ KAPE☆33Updated last year
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆189Updated 3 years ago
- A curated list of KAPE-related resources☆177Updated 7 months ago
- Stand-alone parser for User Access Logging from Server 2012 and newer systems☆78Updated last year
- Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations☆101Updated 4 months ago