google / GiftStickLinks
1-Click push forensics evidence to the cloud
☆144Updated 4 months ago
Alternatives and similar repositories for GiftStick
Users that are interested in GiftStick are comparing it to the libraries listed below
Sorting:
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆109Updated 7 years ago
- Tools to assist in forensicating docker☆86Updated 10 months ago
- Invoke-LiveResponse☆150Updated 3 years ago
- Different DFIR and CTI utilities☆37Updated 5 years ago
- InvestigationPlaybookSpec☆71Updated 8 years ago
- Tools for the Computer Incident Response Team☆150Updated 8 years ago
- Slides and Other Resources from my latest Talks and Presentations☆24Updated 4 months ago
- A rewrite of mactime, a bodyfile reader☆38Updated last year
- stoQ Public Plugins☆71Updated 2 years ago
- Automatically create YARA rules from malicious documents.☆212Updated 3 years ago
- Extension to Cuckoo Sandbox open source projects, adds support to AWS cloud functionalities and enables running emulation on auto-scaling…☆135Updated 3 years ago
- A collection of typical false positive indicators☆56Updated 5 years ago
- Term concordances for each course in the SANS DFIR curriculum. Used for automated index generation.☆69Updated 5 years ago
- Recon Hunt Queries☆79Updated 4 years ago
- Security Monitoring Resolution Categories☆138Updated 4 years ago
- Tools to automate and/or expedite response.☆116Updated last year
- Assimilate is a series of scripts for using the Naïve Bayes algorithm to find potential malicious activity in HTTP headers☆92Updated 8 years ago
- Python IOC Editor☆65Updated 10 years ago
- Expert Investigation Guides☆51Updated 4 years ago
- A Python library to help with some common threat hunting data analysis operations☆143Updated 2 years ago
- The Cold Disk Quick Response (CDQR) tool is a fast and easy to use forensic artifact parsing tool that works on disk images, mounted driv…☆344Updated 3 years ago
- misp-cloud - Cloud-ready images of MISP☆74Updated 3 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 5 years ago
- Salt States for Configuring the SIFT Workstation☆107Updated 2 weeks ago
- PowerShell No Agent Hunting☆111Updated 7 years ago
- Paper and Links to Crimeware in the Modern Era☆31Updated 6 years ago
- Volatility plugins created by the author☆44Updated 10 years ago
- Threat Feed Aggregation, Made Easy☆169Updated 5 years ago
- automate your MISP installs☆68Updated 5 years ago
- Extract indicators of compromise from text, including "escaped" ones.☆162Updated 5 years ago