google / GiftStickLinks
1-Click push forensics evidence to the cloud
☆141Updated last year
Alternatives and similar repositories for GiftStick
Users that are interested in GiftStick are comparing it to the libraries listed below
Sorting:
- Tools to assist in forensicating docker☆84Updated 5 months ago
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆110Updated 7 years ago
- Extension to Cuckoo Sandbox open source projects, adds support to AWS cloud functionalities and enables running emulation on auto-scaling…☆136Updated 3 years ago
- Invoke-LiveResponse☆148Updated 3 years ago
- InvestigationPlaybookSpec☆72Updated 7 years ago
- stoQ Public Plugins☆71Updated 2 years ago
- Tools to automate and/or expedite response.☆115Updated last year
- Checks with NSRL RDS servers looking for for hash matches☆114Updated 4 years ago
- automate your MISP installs☆68Updated 5 years ago
- Oriana is a threat hunting tool that leverages a subset of Windows events to build relationships, calculate totals and run analytics. The…☆179Updated 4 years ago
- Tools for the Computer Incident Response Team☆144Updated 8 years ago
- Paper and Links to Crimeware in the Modern Era☆31Updated 5 years ago
- A rewrite of mactime, a bodyfile reader☆40Updated last year
- Volatility plugins created by the author☆44Updated 9 years ago
- Salt States for Configuring the SIFT Workstation☆105Updated 3 weeks ago
- Security Monitoring Resolution Categories☆138Updated 3 years ago
- Main Build directory☆179Updated 6 years ago
- Extract indicators of compromise from text, including "escaped" ones.☆161Updated 5 years ago
- A collection of typical false positive indicators☆55Updated 4 years ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 6 years ago
- This repository is created to add value to existing Network Security Monitoring solutions.☆43Updated 8 years ago
- Slides and Other Resources from my latest Talks and Presentations☆24Updated 4 years ago
- Automatically create YARA rules from malicious documents.☆212Updated 3 years ago
- Extract common Windows artifacts from source images and VSCs☆65Updated 4 years ago
- SEC599 supporting GitHub repository☆16Updated 5 years ago
- PowerShell No Agent Hunting☆109Updated 7 years ago
- Different DFIR and CTI utilities☆37Updated 5 years ago
- ☆83Updated 2 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- Threat Alert Logic Repository☆92Updated 6 years ago