google / osdfir-infrastructure
Helm charts for running open source digital forensic tools in Kubernetes
☆94Updated last week
Alternatives and similar repositories for osdfir-infrastructure:
Users that are interested in osdfir-infrastructure are comparing it to the libraries listed below
- DFIQ is a collection of investigative questions and the approaches for answering them☆278Updated 3 months ago
- The Sigma command line interface based on pySigma☆152Updated 3 weeks ago
- ☆87Updated 2 months ago
- Rules generated from our investigations.☆194Updated last month
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆153Updated 2 months ago
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆162Updated 2 months ago
- A repository of my own Sigma detection rules.☆158Updated 8 months ago
- ForgeArmory provides TTPs that can be used with the TTPForge (https://github.com/facebookincubator/ttpforge).☆108Updated 7 months ago
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (EXT4, XFS) journals (not systemd-journald), generates…☆63Updated last month
- acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.☆102Updated 3 weeks ago
- An open source platform to support analysts to organise their case and tasks☆71Updated last week
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆127Updated 9 months ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆46Updated last week
- Import CrowdStrike Threat Intelligence into your instance of MISP☆46Updated last month
- ☆52Updated 11 months ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆155Updated 3 years ago
- Threat Intel Platform for T-POTs☆147Updated last week
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆103Updated 6 months ago
- ☆6Updated 6 months ago
- LOKI2 - Simple IOC and YARA Scanner☆92Updated 9 months ago
- MISP Playbooks☆199Updated 2 months ago
- This repository contains helper scripts and custom configs to get the best out of Google's Timesketch project.☆109Updated last year
- An opensource sigma conversion tool built using pysigma☆125Updated 4 months ago
- Automated YARA Rule Standardization and Quality Assurance Tool☆214Updated last week
- Dettectinator - The Python library to your DeTT&CT YAML files.☆111Updated last month
- ATT&CK Sync is a Center for Threat-Informed Defense project that aims to improve the ability for organizations to consume MITRE ATT&CK® v…☆20Updated 2 weeks ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆80Updated this week
- A repository to share publicly available Velociraptor detection content☆163Updated this week
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆126Updated last year
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆132Updated last year