google / grr-docLinks
Documentation for the GRR Rapid Reponse framework
☆303Updated 8 months ago
Alternatives and similar repositories for grr-doc
Users that are interested in grr-doc are comparing it to the libraries listed below
Sorting:
- DEPRECATED - USE v3 (bearded-avenger)☆228Updated 7 years ago
- SIFT Bootstrap Script☆146Updated 7 years ago
- Honeypot Intelligence with Splunk☆254Updated 6 years ago
- Incident Response Forensic Framework☆600Updated 5 years ago
- ☆190Updated last year
- DPS' Lightweight Investigation Notebook☆430Updated last year
- File Scanning Framework☆292Updated 3 years ago
- OpenDXL Python Client☆94Updated 4 months ago
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆465Updated 6 years ago
- Alienvault Labs Projects Random Stuff☆520Updated 3 years ago
- CRITs - Collaborative Research Into Threats☆902Updated 5 years ago
- The Cold Disk Quick Response (CDQR) tool is a fast and easy to use forensic artifact parsing tool that works on disk images, mounted driv…☆337Updated 2 years ago
- CRITs Services Collection☆184Updated 4 years ago
- An open source framework for enterprise level automated analysis.☆395Updated 2 years ago
- SIFT☆507Updated last year
- CrowdStrike Falcon Orchestrator provides automated workflow and response capabilities☆186Updated last year
- A tool to retrieve malware directly from the source for security researchers.☆563Updated 7 years ago
- Protocol Analysis/Decoder Framework☆492Updated 2 years ago
- Automated deployment scripts for the RockNSM network hunting distribution.☆453Updated last year
- Bro scripts written by CrowdStrike Services☆146Updated 4 years ago
- Laika BOSS: Object Scanning System☆745Updated 5 months ago
- Sandia Cyber Omni Tracker (SCOT)☆247Updated 6 months ago
- A tool for deploying and detecting use of Active Directory honeytokens☆507Updated 2 years ago
- Collecting & Hunting for IOCs with gusto and style☆116Updated 6 years ago
- Carbon Black API Resources☆93Updated 7 years ago
- Scripts and code referenced in CrowdStrike blog posts☆331Updated 5 years ago
- ELK configuration files for Forensic Analysts and Incident Handlers (unmaintained)☆179Updated 5 years ago
- Configuration guidance for implementing Pass-the-Hash mitigations. #nsacyber☆199Updated 8 years ago
- Threat Intelligence APIs☆278Updated last year
- Retrieves the definitions of Windows Event Log messages embedded in Windows binaries and provides them in discoverable formats. #nsacyber☆402Updated 2 years ago